ccpq/data/lpic1_pratice_book_all.csv

361 KiB
Raw Blame History

1LEVELANSWERQUESTION1234EXPLICATION
2101-5004Which of the following commands is used to view kernel-related udev events in real time?udevls alllsudev -fudevmon -audevadm monitorThe udevadm command is used to work with the udev interface of the kernel, and the monitor subcommand displays kernel uevents and other udev events in real time.
3101-5002Which command enables you to view the current interrupt request (IRQ) assignments?view /proc/irqcat /proc/interrupts cat /dev/irq less /dev/irqCurrent IRQ assignments are contained in the file /proc/interrupts. Therefore, viewing the contents of the file with a command such as cat will work. There is no “view” command, making option A incorrect. Likewise, there is no /dev/irq file, making options C and D incorrect.
4101-5004Configuration of udev devices is done by working with files in which directory? /udev/devices /devices/ /udev/config /etc/udevConfiguration files for udev are found in /etc/udev, which makes option D correct. The other options do not exist.
5101-5001Which command is used to automatically load a module and its dependencies? modprobe lsmod insmod rmmodThe modprobe command loads the module and its dependencies, if applicable. The lsmod command is used to list currently loaded modules, making option B incorrect. The insmod command will load a given module but not its dependencies. Option D, rmmod, is used to remove a module from memory.
6101-5002Which command is used to obtain a list of USB devices? usb-list lsusb ls-usb ls --usbThe lsusb command is used to obtain a basic list of USB devices on a system. The other commands are not valid. In the case of option D, the ls command is valid, but there is no --usb option.
7101-5002When working with hotplug devices, you need to gather more information about them through udevadm. Which udevadm command enables you to query the udev database for information on a device? query info getinfo devinfoThe info command for udevadm enables querying for additional information about a hotplug device managed with udev.
8101-5004Which command can be used to view the kernel ring buffer in order to troubleshoot the boot process? lsboot boot-log krblog dmesgThe dmesg command displays the contents of the kernel ring buffer. On many Linux distributions, this log is also saved to /var/log/dmesg. The other options shown for this question are not valid commands.
9101-5003During the initialization process for a Linux system using SysV init, which runlevel corresponds to single-user mode? Runlevel 5 Runlevel SU Runlevel 1 Runlevel 6Runlevel 1, sometimes displayed as runlevel s or S, is single-user mode in which many services are not started. Runlevels 5 and 6 are used for other purposes, and runlevel SU is not a valid option.
10101-5004On a system using SysV init, in which directory are the startup and shutdown scripts for services stored? /etc/init-d /etc/init /etc/sysV /etc/init.dScripts are stored in /etc/init.d on a system using SysV init. You may sometimes find these linked from /etc/rc.d/init.d as well. The other options are not valid for this question.
11101-5001Which command can be used to reboot a system? init 6 shutdown -h -t now init 1 refresh-systemThe init command can be used to access different runlevels. Runlevel 6 is used for rebooting the system. Option B will shut down the system entirely, not reboot it. Option C will place the system into single-user mode. Option D is not a valid option.
12101-5003When using an SysV init-based system, which command would you use if you make changes to the /etc/inittab file and want those changes to be reloaded without a reboot? init-refresh init 6 telinit reload-inittabThe telinit command can be used to refresh the system after changes have been made to /etc/inittab. Notably, option B will reboot the system but that was not an option in the question. Options A and D are not valid commands.
13101-5004Which command displays the current runlevel for a system? show-level init --level sudo init runlevelThe runlevel command displays the current runlevel for a system. Option B is not a valid option to the init command, and adding sudo in front of the init command makes no difference. Option A is not a valid command.
14101-5003Within which folder are systemd unit configuration files stored? /etc/system.conf.d /lib/system.conf.d /lib/systemd/system /etc/sysconfdUnit configuration files are stored in /lib/systemd/system. The other directory options for this question are not relevant or do not exist by default.
15101-5002Which command is used with systemd in order to list the available service units? systemd list-units systemctl list-units systemd unit-list systemctl show-unitsThe systemctl command is used to work with services and targets. The list-units command is used to list targets. The other commands are not used for this purpose or do not exist with the required option.
16101-5003Which option to lspci is used to display both numeric codes and device names? -numdev -n -nn -devnumThe -nn option displays both numbers and device names, making option C correct. The -n option (option B) displays only numbers. The other two options do not exist.
17101-5004Which command can be used to obtain a list of currently loaded kernel modules? insmod modlist ls --modules lsmodThe lsmod command is used to list currently loaded kernel modules, making option D correct for this question. The insmod command (option A) is used to load modules. Option C is a valid command but not a valid option for that command, and option B does not exist.
18101-5003Which option to the modprobe command shows the dependencies for a given module? --show-options --list-deps --show-depends --list-allThe --show-depends option shows the modules that depend on the specified module. The other options do not exist.
19101-5002Which command can you use to send a message to all users who are currently logged into a system? cat wall tee sshThe wall command is used to send a message to all users, thereby making option B correct. The cat command is used as a means to concatenate or view files, and tee is used to send output to standard output and a file. Finally, ssh is the secure shell client command and is not used for the purpose specified.
20101-5002Which of the following is a good first troubleshooting step when a hard disk is not detected by the Linux kernel? Unplug the disk. Check the system BIOS.Restart the web server service. Run the disk-detect command.Checking to ensure that the disk is detected in the basic input/output system (BIOS) is a good first step in troubleshooting. Option A, unplugging the disk, wont help it to be detected. Restarting the web server wont help detect the disk, and the disk-detect command does not exist.
21101-5004Within which directory is information about USB devices stored? /etc/usbdevices /var/usb /lib/sys/usb /sys/bus/usb/devicesThe /sys/bus/usb/devices directory contains information about USB devices. The other directories are not valid for this purpose.
22101-5004If the kernel ring buffer has been overwritten, within which file can you look to find boot messages? /var/log/bootmessages /var/log/mail.info /var/adm/log/boot.info /var/log/dmesgThe file /var/log/dmesg will typically contain historical messages from the current booting of the system. On some distributions of Linux, this information is also in /var/log/boot.log.
23101-5003Which command and option can be used to determine whether a given service is currently loaded? systemctl --ls telinit systemctl status sysctl -aOut of the options given, the systemctl status command and option is the most appropriate. The telinit and sysctl commands are not used for this purpose. Likewise, the --ls option is not valid for systemctl.
24101-5002Which command on a systemd-controlled system would place the system into single-user mode? systemctl one systemctl isolate rescue.target systemctl single-user systemctl runlevel oneThe isolate option is used to move the system into the target specified, making option B the correct one. The other options do not exist.
25101-5001Which command on a system controlled by Upstart will reload the configuration files? initctl reload systemd reload upstart --reload ups -reloadThe initctl reload command causes Upstart to reread its configuration files.
26101-5002When working with a SysV system, which option to chkconfig will display all services and their runlevels? --reload --list --all --lsThe --list option will show all services on a system along with their status for each runlevel.
27101-5003A drive connected to USB is considered which type of device? Medium Coldplug Hotplug SideplugUSB devices are generally considered to be hotplug devices. Hotplug devices describe those devices that can be inserted and removed while the system is “hot,” or powered on, whereas coldplug devices are those that must be inserted and removed when the system is powered off.
28101-5002The system is using a temporary flash USB disk for data mounted at /dev/sda1. You need to remove the disk. Which of the following commands will enable the disk to be safely removed from the system? usbstop /dev/sda umount /dev/sda1 unmount /dev/sda1 dev-eject /dev/sda1The umount command is used to unmount drives within a running system. The other commands do not exist.
29101-5004You have connected a USB disk to the system and need to find out its connection point within the system. Which of the following is the best method for accomplishing this task? Rebooting the system Viewing the contents of /var/log/usb.log Connecting the drive to a USB port that you know the number of Running dmesg and looking for the diskOf the options presented, running dmesg is a common way to determine the location to which the kernel has assigned the drive. Rebooting the system is not a good option, though it would work. There is no such thing as /var/log/usb.log, and the location of the drive may change regardless of port, depending on how the drive may be detected in the system.
30101-5002Which of the following commands will initiate an immediate shutdown of the system? shutdown -c halt systemd stop stop-systemFrom these options, only B will shut down the system immediately. Option A will cancel a shutdown.
31101-5003Which option within a systemd service file indicates the program to execute? StartProgram ShortCut ExecStart StartupThe ExecStart option indicates the command to be executed on startup of a systemd service.
32101-5004Which command will display the default target on a computer running systemd? systemctl defaults update-rc.d defaults systemctl runlevel systemctl get-defaultThe systemctl get-default command will show the default target. The other commands and options are not valid.
33101-5001Which option to the systemctl command will change a service so that it runs on the next boot of the system? enable startonboot loadonboot startThe enable option configures the service to start on boot. The start option, D, is used to start a service immediately. The other options are not valid for this command.
34101-5003Which of the following best describes the /proc filesystem? /proc contains information about files to be processed. /proc contains configuration files for processes. /proc contains information on currently running processes, including the kernel. /proc contains variable data such as mail and web files.The /proc filesystem contains information about currently running processes and additional information about the kernel and current boot of the system.
35101-5003Which command will retrieve information about the USB connections on a computer in a tree-like format? lsusb -tree lsusb --tree lsusb -t usblist --treeThe -t option to lsusb will print output in a tree-like format so that you can see which devices are connected to which bus. The other arguments to lsusb are not valid, and the usblist command is not real.
36101-5004What is one reason why a device driver does not appear in the output of lsmod, even though the device is loaded and working properly?The use of systemd means that drivers are not required for most devices. The use of initramfs means that support is enabled by default. The system does not need a driver for the device. Support for the device has been compiled directly into the kernel.If a working device does not appear in lsmod, it typically means that the kernel has a driver already loaded by virtue of being compiled into the kernel itself rather than loaded through a module. The use of systemd (option A) or initramfs (option B) has no effect.
37101-5003Which option to rmmod will cause the module to wait until its no longer in use to unload the module? -test -f -w -unloadThe -w option causes the module to wait until its no longer needed prior to unloading. The -f option forces immediate removal and should be used with caution. The other options are not valid for rmmod.
38101-5002You are using a storage area network (SAN) that keeps causing errors on your Linux system due to an improper kernel module created by the SAN vendor. When the SAN sends updates, it causes the filesystem to be mounted as read-only. Which command and option can you use to change the behavior of the filesystem to account for the SAN bug? mount --continue tune2fs -e continue mkfs --no-remount mount -o remountThe tune2fs command can be used for this purpose but should be used with care because it can result in data corruption.
39101-5003Within which directory are rules related to udev stored? /etc/udev.conf /etc/udev.conf.d /etc/udev/rules.d /etc/udev.dRules related to udev are stored in /etc/udev/rules.d. The /etc/udev hierarchy contains the udev.conf configuration file along with other components related to the configuration of udev.
40101-5002Which option to lspci displays the kernel driver in use for the given Peripheral Component Interconnect (PCI) device? -t -k -n -aThe -k option shows the kernel driver associated with a given PCI device and can be helpful when planning a new kernel compile. The -t option displays information in a tree- like structure, and -n uses numbers instead of device names. There is no -a option.
41101-5002Within which of the following directories will you find blacklist information for modules loaded with modprobe? /etc/blacklist /etc/modprobe.d /etc/blacklist.mod /etc/modprobeThe /etc/modprobe.d directory is used for storing configuration information related to modules such as that used for blacklisting purposes but also for other configuration information, such as udev and module options.
42101-5002When working with a CentOS 6 system, which command is used to create the initial RAM disk? mkinit dracut mkraminit mkinitfsThe dracut command is used to create the initial RAM disk for newer systems and has replaced the legacy mkinitrd command used for the same purpose.
43101-5004Within which file will you find a list of the currently available kernel symbols? /proc/kernelsyms /etc/kernel.conf /etc/lsyms /proc/kallsymsThe file /proc/kallsyms provides a way to view the currently loaded kernel symbols. This can be helpful for resolving module dependencies. Note that on legacy systems, this file might be called /proc/ksyms.
44101-5001Which of the following commands can be used to show the various information related to a currently loaded module, including core size and settings for options? systool -v -m <module> modinfo -r <module> lsmod <module> infmod <module>The systool utility can be used to show currently loaded options for a given module. The modinfo -r command is not valid, and though modinfo shows information about a module, it does not include core size and other settings. The lsmod command cannot be used for this purpose, and there is no infmod command.
45101-5002Which directory contains various elements and configuration information about the kernel such as the release number, domain name, location of modprobe, and other settings? /proc/sys/kmod /proc/sys/kernel /proc/kernel /proc/kernel/sysThe /proc/sys/kernel hierarchy contains vital configuration information about a kernel. These settings can be changed on a running system.
46101-5002Within which directory should systemd unit files that you create be stored? /etc/system /etc/systemd/system /usr/share/systemd /usr/share/systemThe /etc/systemd/system directory is where it is recommended to store unit files for systemd. The other locations are not valid.
47101-5003Which of the following commands should you execute after making changes to systemd service configurations in order for those changes to take effect? systemd reload reboot systemctl daemon-reload systemctl rebootThe systemctl command will be used for this purpose with the daemon-reload subcommand. The reboot option would work to reload the systemd configuration but is not correct because it requires the entire server to reboot, which is not what was asked in this question.
48101-5002Which of the following files contains the runlevels for the system along with a reference to the corresponding rc file?/etc/runlevels /etc/inittab /etc/rc /etc/runlevelThe /etc/inittab file contains the various runlevels and what to run at the given runlevel. For example, runlevel 1 is single-user, runlevel 6 is reboot, and so on. The other files listed do not exist.
49101-5002Which boot loader can be used for File Allocation Table (FAT) filesystems and might be used for a rescue disk? SYSBOOT SYSLINUX TIELINUX FATLINUXThe SYSLINUX boot loader is used for FAT filesystems to create rescue disks and to assist with installation of Linux in general. SYSLINUX also describes an overall project containing other specialty boot loaders. The other options listed for this question are not valid boot loaders, though.
50101-5003Which of the following is used to provide an early filesystem-based loading process for key drivers needed to continue the boot process? bootrd driverload initrd initdrvinitrd is used for an initial root filesystem for early drivers. initrd is configured to load within the GRUB configuration file for a given operating system.
51101-5002When booting a system you receive an error similar to "No init found" and are then placed at an initramfs prompt. You need to check the hard drive for errors. Which of the following commands performs an error check on a hard drive partition in Linux? defrag fsck checkfs chkfsThe fsck command is used to diagnose and repair hard drive problems in Linux. The defrag command is not available in Linux.
52101-5004Which of the following commands places the system in single-user mode? tellinit 1 chginit 1 telinet 1 telinit 1The telinit command can be used for this purpose, and passing 1 as the argument will switch the system into single-user mode. The other commands shown are not valid.
53101-5004Which of the following commands changes the boot order for the next boot? efibootmgr -c efibootmgr -b -B efibootmgr -o efibootmgr -nThe -n option changes the boot order for the next boot only and boots from the specified partition. The -b along with -B modifies and then deletes the option. The -o option sets the boot order. The -c option creates a boot number.
54101-5001Which boot loader can be used with ISO9660 CD-ROMS? ISOLINUX EFIBOOT ISOFS BOOTISOISOLINUX provides a means by which CD-ROMS formatted as ISO 9660 can be booted. Its very common to have live CDs or rescue/recovery CDs that use ISOLINUX for boot. The other boot loaders are not valid for this purpose or dont exist.
55101-5001Within which directory are systemd user unit files placed by installed packages? /usr/lib/systemd/user /usr/lib/systemd/system /usr/systemd /usr/systemThe /usr/lib/systemd hierarchy contains files related to systemd configuration. The user directory within the hierarchy is used for user unit files, and the system files are stored in /usr/lib/systemd/system.
56101-5002"When using Unified Extensible Firmware Interface (UEFI), which of the following files can be used as a boot loader? shim.uefi shim.efi shim.fx efi.shimDue to the decidedly insecure decisions made with the design of Microsofts UEFI, a shim is often needed to enable Linux to boot on a system with UEFI. The shim.efi file can be used as an initial boot loader for this purpose.
57101-5004Which directory on a SysV init-based system contains scripts that are used for starting and stopping services? /etc/rc.int /etc/boot /etc/bootscripts /etc/init.dScripts for starting and stopping services are located in /etc/init.d on a SysV init-based system. The other directories listed within this question are not valid.
58101-5003Which of the following commands is used to find overriding configuration files on a systemd-based system? diff systemctl -diff systemd-delta systemctl configoverrideThe systemd-delta command is used to determine overridden configuration files. Of the other commands, diff is valid but not for this purpose. The systemctl command is also valid, but again, not for the purpose described.
59101-5002Which of the following commands on a Red Hat system lists all of the SysV services set to be executed on boot along with their setting for each runlevel? rlevel chkconfig --list bootldr --list init --bootlistThe chkconfig --list command displays all services that will be executed on boot along with the setting for each service for each runlevel. Of the other commands, the init command is valid but does not have a --bootlist option. The other commands are invalid.
60101-5002Which of the following commands, executed from within the UEFI shell, controls the boot configuration? bootcfg bcfg grub-install grcfgThe bcfg command within the UEFI shell is used to configure boot loaders on a UEFI- based system. The command can accept various parameters to configure how the boot loader and kernel will load on boot. Of the other commands shown, grub-install is valid but not within the UEFI shell.
61101-5004Which file must exist within /tftpboot on the Trivial File Transfer Protocol (TFTP) server for a system that will use PXELINUX for its boot loader? pxelinux.tftp pxelinux.boot pxelinux.conf pxelinux.0The pxelinux.0 file must exist within /tftpboot on the TFTP server in order for a system to use PXELINUX for booting. The other files are not valid or necessary for PXELINUX.
62101-5004Which utility can you use on a Debian or Ubuntu system to manage SysV init scripts, such as setting them to run on boot? bootorder bootloader configchk update-rc.dThe update-rc.d utility can be used to manage SysV init scripts on Debian or Ubuntu and other distributions. When using update-rc.d, you supply the script name and the utility will take care of creating symlinks to the appropriate runlevels.
63101-5002Which key, pressed during the operating system selection menu, is used to enable editing of the parameters related to boot with GRUB? v e r yThe e key, when pressed at the right time during boot, will send you into the GRUB shell, where you can change parameters related to boot, such as the kernel options and other related parameters.
64101-5004Which systemctl subcommand is used to switch runlevels? switch move runlevel isolateThe isolate subcommand followed by the desired target is used to switch between runlevels with a systemd-based system. The other subcommands shown are not valid for systemctl.
65101-5003When examining the /etc/inittab file, which option signifies the default runlevel to which the system will boot? default defaultboot initdefault defaultlvlThe runlevel defined as initdefault is the default runlevel for the system. The other options shown do not exist.
66101-5002Which of the following is used instead of initrd to provide an early filesystem for essential drivers? initnext initramfs initialize initfsThe initramfs system is used instead of initrd to create the filesystem-based loading process for key drivers that are needed for boot.
67101-5001Which of the following commands sets the default systemd target to multi-user? systemctl set-default multi-user.target systemd set-default multi-user.target systemctl set-def muser.target systemd set-def muser.targetThe systemctl command will be used for this purpose, and the set-default subcommand is necessary to affect the desired behavior. The target file is simply called multi-user.target.
68101-5003When using a shim for booting a UEFI-based system, which of the following files is loaded after shim.efi? grubx64.cfg grub.conf grubx64.efi efi.bootThe shim.efi boot loader loads another boot loader, which is grubx64.efi by default. The other options are not valid filenames for the purpose described.
69101-5004Within which hierarchy are files from /etc/init.d linked so that the files are executed during the various runlevels of a SysV system? /etc/rc.S /etc/rc /etc/boot/rc /etc/rc.dThe /etc/rc.d hierarchy contains symbolic links to files found within /etc/init.d. These symlinks are then used for executing the scripts at the appropriate runlevel. For example, on boot the system will execute the scripts found in the runlevel directory for each runlevel executed at boot time.
70101-5001What is the name of the unit to which a systemd system is booted in order to start other levels? default.target init.target initial.target load.targetThe default.target is the default target unit that is activated by systemd on boot. The default target then starts other services based on the dependencies.
71101-5002When viewing information in /dev/disk/by-path using the command ls -l, which of the following filenames represents a logical unit number (LUN) from Fibre Channel? /dev/fc0 pci-0000:1a:00.0-fc-0x500601653ee0025f:0x0000000000000000 pci-0000:1a:00.0-scsi-0x500601653ee0025f:0x0000000000000000 /dev/fibre0LUNs that contain the characters fc are found through Fibre Channel. Therein lies the difference between options B and C, where option C contains the letters scsi, which would usually represent a local disk. The other options are not valid.
72101-5002You have purchased new solid-state drive (SSD) hardware that uses the NVMe (Non-Volatile Memory Express) protocol but cannot find the disks in the normal /dev/sd* location in which you have traditionally found such storage. In which location should you look for these drives? /dev/nd* /dev/nvme* /dev/nv* /dev/nvme/*NVMe-capable drives are named /dev/nvme*. No special drivers are needed other than those found in the native kernel on a modern system. The other options do not exist as paths by default.
73101-5004Which file contains information about the current md Redundant Array of Inexpensive Disks (RAID) configuration such as the personalities? /proc/raidinfo /proc/rhyinfo /proc/mdraid /proc/mdstatThe /proc/mdstat file contains information on RAID arrays, including RAID personalities found on the system, the devices that comprise the array, and other pertinent information. The other files shown are not valid.
74101-5002Which of the following directory hierarchies contains information such as the World Wide Name (WWN) for Fibre Channel? /sys/class/wwn /sys/class/fc_host /sys/class/fclist /sys/class/fc/wwnThe /sys/class/fc_host directory contains other directories based on the Fibre Channel connections available. Within those host directories will be found the WWN in a file called port_name. The other directory hierarchies are not valid.
75101-5003Information about logical volumes can be found in which of the following directories? /dev/lvinfo /dev/map /dev/mapper /dev/lvmapThe /dev/mapper directory contains information about multipath devices such as logical volumes. The other directories are not valid.
76101-5003Which of the following commands will examine the PCI subsystem for NVMe-based devices? psnvme lsnvme lspci | grep scsi lspci | grep -i nvmeThe lspci command will be used for this purpose. NVMe devices are listed with the name nVME or NVMe; therefore, adding -i to grep will make the search case insensitive. Youd use this in order to ensure that the devices are detected. The other commands are not valid, with the exception of the lspci command, but you cannot grep for scsi in this scenario.
77101-5004Which of the following devices is the location of the first Small Computer System Interface (SCSI) tape device detected at boot? /dev/st1 /dev/sd0 /dev/sd1 /dev/st0Tape devices are found within /dev/st*, making st0 the first device.
78101-5003Which of the following files should be used to display a message to users prior to logging in locally? /etc/loginmesg /etc/logmessage.txt /etc/issue /etc/bannerThe /etc/issue file is used to provide a message to users, such as a login banner, prior to local login. The other files shown are not valid for the purpose described.
79101-5003Which file contains a message that is displayed after a successful login? /etc/loginbanner /etc/issue /etc/motd /etc/messageThe contents of the file motd, an abbreviation for Message of the Day, are displayed when a user logs in successfully. Among the other options, the contents of /etc/issue are displayed prior to local login. The other filenames are not valid for this purpose.
80101-5002Which of the following files can be used to provide a message to users logging in remotely with a protocol such as telnet? /etc/telnet.msg /etc/issue.net /etc/login.msg /etc/telnet.loginThe /etc/issue.net file is used to provide a message for remote logins such as telnet. The other files listed are not valid for the purpose described.
81101-5004Which of the following commands turns off the computer, including removing power, if possible? systemctl halt systemctl reboot systemctl stop systemctl poweroffThe poweroff target of systemd, accessed using the systemctl command, is used for halting the system and then attempting to remove power on compatible systems. The halt target stops the system but does not attempt to remove power, whereas reboot simply restarts the system. There is no stop target.
82101-5001Which of the following shutdown commands reboots the system in 15 minutes? shutdown -r +15 shutdown +15 shutdown -15 shutdown -r 00:15The -r option is needed to specify reboot, and the format for counting time from now is prefaced with a plus sign (+), making option A correct. Of the other commands, specifying +15 without the -r option simply shuts down the computer in 15 minutes, and specifying the time as 00:15, as in option D, will shut down the computer at 12:15 a.m.
83101-5001When terminating a process on a SysV init-based system, which command can be used to stop the process? service sysv syscl servcThe service command is used to work with services, such as starting and stopping them. On newer systems, the systemctl command has replaced the service command.
84101-5001Which of the following commands show the boot messages captured by systemd? journalctl -b systemctl -b journalctl -bm journalctl -lThe journalctl command with the -b option displays boot messages.
85101-5001Which option to the shutdown command halts or stops the system? -h -s -f -tThe -h option halts the system, including shutting down acpid-related hardware.
86101-5003Which signal number is used as SIGKILL when used with the kill command? 14911The number 9 corresponds to SIGKILL and can be passed to the kill command to issue that signal. The number 1 is SIGHUP. Others can be found within the manual for the kill command.
87101-5003Which directory contains rc-related startup scripts on a legacy Debian system? /etc/init /etc/inittab /etc/init.d /etc/rc.initThe /etc/init.d directory contains the startup and shutdown scripts for services on a Debian system that is not running systemd.
88101-5001When attempting to enable an integrated peripheral on a basic input/output system (BIOS) system, what should be done to determine whether the peripheral has been enabled within the BIOS? Examine boot messages to determine if the kernel has detected the peripheral. Examine /var/log/auth.log for detection of the peripheral. Reboot the system to determine if the device works. Enable the peripheral by removing it from the blacklisted modules.Among the options, examining the boot messages would be a first logical step and would prevent having to reboot the system. Rebooting may be a next step in order to examine the status of the peripheral within the BIOS.
89101-5003Which option to the wall command suppresses the "Broadcast message" banner that normally displays? -b -a -n -dThe -n option prevents the banner from displaying when using wall. The other options shown are not used with the wall command.
90101-5003A Serial Advanced Technology Attachment (SATA) disk will use which of the following identifiers? /dev/hdX /dev/sataX /dev/sdX /disk/sataXSATA disks are addressed as /dev/sdX, just like a Small Computer System Interface (SCSI ) disk. /dev/hdX is a traditional ATA disk. The other options do not exist.
91101-5003Which option given at boot time within the GRUB configuration will boot the system into single-user mode? single-user su single rootThe keyword single, given on the Linux kernel command line, will boot the system into single-user mode. The other options are not valid.
92101-5001During boot of a system with GRUB, which key can be pressed to display the GRUB menu? Shift E V HThe Shift key, if pressed when control has first been handed to GRUB, will cause the GRUB menu to be displayed.
93101-5002When booting, which option can be added to a GRUB configuration line to set or change the root partition at boot time to /dev/sda2? rootpartition={hd0,2} root=/dev/sda2 root={hd0,3} rootpartition=/dev/sda2The root=/dev/sda2 option will cause the given kernel to load /dev/sda2 for its root partition. The rootpartition option is not valid, and the format of the root={hd0,3} is not valid in this context.
94101-5003Which key combination will enable you to edit the kernel options and then boot when using GRUB Legacy? ESC for editing and then Return to boot v for editing and then Return to boot e for editing and then b to boot v for editing and then b to bootYou begin an editing session with an e when the boot option is highlighted. You can then make changes and, when done, press b to boot the system.
95101-5004During the boot process for a virtual machine, what is the next step in the boot process after the kernel has taken over the initialization process and initializes devices? The system BIOS initializes devices. The system is placed in multi-user mode. The boot loader initializes the kernel. The root partition is mounted.The root partition is mounted after device initialization. System services, including multi-user mode, start after the root partition is mounted. The other two options, A and C, take place prior to the kernel-initializing device drivers. This process is essentially the same for virtual machines as it is for physical machines.
96101-5004Where in the filesystem will the EFI system partition (ESP) typically be mounted? /etc/efi /efi /sys/efi /boot/efiThe ESP is typically mounted at /boot/efi.
97101-5004When partitioning a disk for a mail server running postfix, which partition/mounted directory should be the largest in order to allow for mail storage? /etc /usr/bin /mail /varThe partition containing /var should be the largest for a mail server because mail spools are stored within this hierarchy. The /etc/ hierarchy is usually small, as is /usr/ bin. The /mail directory does not exist by default.
98101-5003Which option within GRUB Legacy is used to indicate that a root partition contains a non-Linux kernel? initrd non-linux rootnoverify root-winThe rootnoverify option is used to specify a non-Linux kernel, one that GRUB should not attempt to load. The initrd option is used for specifying the initial RAM disk, making option A incorrect. The remaining options, B and D, are not valid options for GRUB.
99101-5001Which command will output a new GRUB2 configuration file and send the output to the correct location for booting? update-grub > /boot/grub/grub.cfg update-grub boot > /boot/grub.cfg grub-rc.d grub-bootThe update-grub command sends its output to STDOUT. Therefore, you must redirect using > and send that output to the correct file. The other options are not valid for this purpose. Options C and D are not valid commands, and option B contains invalid options as well as an invalid location for the destination file.
100101-5002What is the maximum number of primary partitions available on an MBR partitioning system? 2415MBR-based disks can be partitioned with up to four primary partitions, one of which can be further partitioned or extended into logical partitions.
101101-5004Which command is used to update the links and cache for shared libraries on the system? ldcache cache-update link-update ldconfigThe ldconfig command updates the current shared library cache and list. ldconfig reads /etc/ld.so.conf and incorporates any changes found within it. The other commands listed as options for this question do not exist.
102101-5002Which command and option is used to update a Debian system to the latest software? apt-update apt-get upgrade dpkg -U apt-cache cleanThe upgrade option for apt-get will upgrade the system to the latest version of software for packages already installed. The apt-update command does not exist, nor does the -U option to dpkg. The apt-cache command is used to work with the package cache.
103101-5003Which option given to a yum command will install a given package? update configure install getThe yum install command will install a given package. The update option will update a package. The other options listed do not exist.
104101-5003What is the location of the home directory for the root user? /home/root /home/su /root /Roots home directory is /root on a Linux system. While the /home directory does exist, there is no root or su user within that hierarchy by default. The / directory is the root of the filesystem but not the roots home directory.
105101-5001When using rpm2cpio, by default the output is sent to which location? STDOUT The cpio.out file The a.out file The /tmp/cpi.out filerpm2cpio sends its output to STDOUT by default, and therefore that output needs to be redirected to a file in most cases.
106101-5002Which partition or directory structure typically holds most of the programs for a Linux system? /etc /usr /home /varThe /usr hierarchy contains many of the programs that run on a Linux system. Other notable directories for programs are /bin and /sbin.
107101-5002Your GRUB Legacy configuration includes a dual-boot option with Linux listed first and another operating system listed second. Which of the following options will boot to the Linux partition by default? default=linux default=0 default=1 default=otherGRUB begins its count at 0 and in this scenario there are two operating systems. Therefore, because Linux is first in the configuration file its number would be 0, which is then sent to the default= option.
108101-5001Which file should you edit when using GRUB2 in order to set things like the timeout? /etc/default/grub /etc/grub/boot /etc/boot/grub.d /grub.d/bootThe /etc/default/grub file can be used for this purpose. You may also edit /boot/grub/grub.cfg, but this was not an option given for this question.
109101-5002Which yum option displays the dependencies for the package specified? list deplist dependencies listdepsThe deplist option displays the dependencies for the given package. The list option displays information about a specific package while the other two options are not valid.
110101-5001Which options for an rpm command will display verbose output for an installation along with progress of the installation? -ivh -wvh --avh --ins-verboseThe -ivh options will install a file using rpm, displaying both verbose output and hash marks for progress. The other options presented do not exist or do not accomplish the specified task.
111101-5002Which of the following commands adds /usr/local/lib to the LD_LIBRARY_PATH when using BASH shell? set PATH=/usr/local/lib export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/local/lib LD_LIBRARY_PATH=/usr/local/lib connectpath LD_LIBRARY_PATH=/usr/local/libThe export command is used to set environment variables in BASH. The other commands are not valid for this purpose.
112101-5004Which command can be used to download an RPM package without installing it? yumdl yumdownloadonly yumdown yumdownloaderThe yumdownloader utility will download an RPM package but not install it. The yumdownloader utility is part of the yum-utils package. The other options listed for this question do not exist.
113101-5001Which command will search for a package named zsh on a Debian system? apt-cache search zsh apt-get search zsh apt-cache locate zsh apt search zshThe apt-cache command is used to work with the package cache and the search option is used to search the cache for the supplied argument, in this case zsh. The apt-get command is used to work with packages themselves, and the apt search command does not exist.
114101-5003Which option within /etc/default/grub is used to configure the default operating system for boot? GRUB_OS GRUB_ON GRUB_DEFAULT DEFAULT_OSThe GRUB_DEFAULT option, when in the /etc/default/grub file, is used to configure the operating system that will boot by default. The other options do not exist in this context.
115101-5001When found in a GRUB configuration file, what does the ro option indicate? Initially mount the root partition as read-only. Mount the kernel as read-only. Start the init program as read-once. Mount the root partition in Raised Object mode.The ro option, which is the default for GRUB, will initially mount the root partition as read-only and then remount as read-write.
116101-5004Within which directory will you find the repositories used by yum? /etc/yum.conf /etc/repos /etc/yum.conf.d /etc/yum.repos.dConfiguration files related to the repositories for yum are located in /etc/yum.repos.d. Of the other options, /etc/yum.conf is a file and not a directory, and the other directories do not exist.
117101-5001Which rpm option can be used to verify that no files have been altered since installation? -V -v --verbose --filesumThe -V or --verify option will check the files in a given package against versions (or checksums) in the package database. If no files have been altered, then no output is produced. Note that output may be produced for files that are changed during installation or for other reasons. Note also the use of an uppercase V for this option as opposed to the lowercase v for verbose.
118101-5003Which option for the grub-mkconfig command sends output to a file instead of STDOUT? -stdout --fileout -o -fThe -o option can be used to specify a destination file to which output will be sent instead of STDOUT. The other options listed in this question do not exist.
119101-5001The presence of menu.lst within the filesystem typically indicates which condition? GRUB Legacy is in use on the system. GRUB2 is in use on the system. An error has occurred creating the output to menu.lst. The options for rescue boot have been changed.The menu.lst and grub.conf files are used in GRUB Legacy, that is, prior to GRUB 2. This therefore makes option B incorrect.
120101-5004Which command is used to determine the libraries on which a given command depends? ldconfig librarylist listdeps lddThe ldd command will list the libraries on which the commands argument depends.
121101-5002Which of the following is true of Linux swap space? Swap is used to hold temporary database tables. Swap is used as additional memory when there is insufficient RAM. Swap is used by the mail server for security. Swap is used to scrub data from the network temporarily.Swap space is used when there is insufficient RAM memory on a system.
122101-5002Which of the following is not typically used to store libraries? /lib /etc/lib /usr/lib /usr/local/libThe /etc/lib directory is not typically associated with library files and does not usually exist on a Linux system unless manually created. The other options either contain system libraries or can be used for that purpose.
123101-5003Which of the following commands updates the package cache for a Debian system? apt-get cache-update apt-cache update apt-get update apt-get upgradeThe apt-get update command will cause the package cache to be updated by retrieving the latest package list from the package sources. There is no cache-update or update option to apt-cache. The upgrade option is used to update the systems packages and not the cache.
124101-5003Within which file are details of the current package repositories stored on a Debian system? /etc/apt.list /etc/sources.list /etc/apt/sources.list /etc/apt.d/sources.listThe sources.list file located in /etc/apt contains the list of repositories for Debian packages. The other file locations do not exist by default.
125101-5001Of the following choices, which size would be most appropriate for the /boot partition of a Linux system? Between 100MB and 500MB Between 1GB and 10GB /boot should not be partitioned separately. Less than 5MBThe /boot partition will typically be much less than 500MB but should not be undersized. The used space within /boot will increase as more kernels are added, such as during an upgrade process. Therefore, even though the recommended size is up to 500MB, experience proves that a larger partition is helpful, possibly 1GB to 2GB.
126101-5002Which of the following commands initializes a physical disk partition for use with Logical Volume Manager (LVM)? lvmcreate pvcreate fvcreate lvinitThe pvcreate command initializes a physical partition for future use as a logical volume with LVM.
127101-5004Which of the following commands installs GRUB into the MBR of the second SATA disk? grub-install /dev/hdb2 grub-install /dev/sda2grub-config /dev/sda grub-install /dev/sdbThe grub-install command is used to install GRUB onto a disk and the second SATA disk would be /dev/sdb, making option D correct.
128101-5001Which command should be used to make changes to the choices made when a Debian package was installed? dpkg-reconfigure dpkg -r dpkg --reconf apt-get reinstallThe dpkg-reconfigure program will cause an already installed package to be reconfigured or changed. The -r option for dpkg removes a package, making option B incorrect. There is no reconf option for dpkg or reinstall option for apt-get.
129101-5003Which command is used to create a logical volume with LVM? pvcreate lvmcreate lvcreate volcreateThe lvcreate command is used to create logical volumes with LVM. The pvcreate command initializes physical volumes prior to creating logical volumes. The commands in the other two options for this question do not exist.
130101-5001What is the logical order for creation of an LVM logical volume? Physical volume creation, volume group creation, logical volume creation Physical volume creation, logical volume creation, volume group creation Logical volume creation, physical volume creation, volume group creation LVM creation, format, partitionPhysical volumes are initialized first, followed by volume group creation, and then logical volume creation.
131101-5004Which of the Debian package management tools provides a terminal-based interface for management? apt-get dpkg apt-cache aptitudeaptitude provides the terminal-based interface rather than the standard command-line interface of the other tools listed in this question.
132101-5004Which option for yum performs a search of the package cache? seek query --search searchThe search option performs a search of various fields such as the package name and description.
133101-5002Which command option for rpm can be used to show the version of the kernel? rpm kernel rpm -qa kernel rpm search kernel rpm --list kernThe rpm -qa kernel command will show the kernel version. You can also use uname -r for the same purpose.
134101-5003Assuming a menu entry of Debian in your GRUB configuration, which option in /etc/default/grub would set that as the default operating system to boot? GRUB_OS GRUB_OS_DEF GRUB_DEFAULT GRUB_CONFThe GRUB_DEFAULT option in /etc/default/grub will set the operating system to boot by default.
135101-5001Which option in /etc/yum.conf is used to ensure that the kernel is not updated when the system is updated? exclude=kernel* exclude-kernel updatekernel=false include-except=kernelThe exclude option can be used to exclude certain packages. The argument accepts wildcards, and therefore excluding all kernel* updates will create the desired behavior.
136101-5002Which command should be run after making a change to the /etc/default/grub file? grub grub-mkconfig grub-inst rebootThe grub-mkconfig command should be run after making a change to the /etc/default/grub file so that a new configuration file can be created with the changed option(s).
137101-5002Which command searches for and provides information on a given package on a Debian system, including whether or not the package is currently installed? dpkg -i dpkg -s apt-cache apt-infoThe -s option to dpkg searches for the given package and provides information about its current status on the system. The apt-cache command is not used for this purpose, and the -i option for dpkg installs a package. The apt-info command does not exist.
138101-5003Which command is used to search for physical volumes for use with LVM? lvmcreate pvcreate lvmdiskscan lvmscanThe lvmdiskscan command looks for physical volumes that have been initialized for use with LVM.
139101-5002Which option added to yumdownloader will also download dependencies? --deps --resolve --resdeps -dThe --resolve option will download the dependencies of the package being downloaded. The other options shown within this question are not valid for the yumdownloader command.
140101-5001Which of the following installs a previously downloaded Debian package? dpkg -i <package name> apt-install <package name> apt-slash <package name> dpkg -U <package name>The -i option to dpkg will install a previously downloaded package. The other commands dont exist, and the -U option for dpkg does not exist.
141101-5004A hard drive is reported as hd(0,0) by the GRUB Legacy configuration file. To which of the following disks and partitions does this correspond? /dev/hdb2 /dev/hda0 /dev/disk1 /dev/sda1GRUB Legacy begins counting at 0 and separates disk letter and partition with a comma, making 0,0 the first partition on the first disk. Options A and C are not the first disk on the system, and option B contains a nonexistent partition.
142101-5001Which filesystem format type is used for the EFI System Partition (ESP)? FAT EXT4 NTFS EXT3ESP uses the legacy FAT filesystem type for its underlying format. There is a specification for how the ESP partition must be created on top of the FAT format for boot loaders and kernel images. Note that the partition is typically FAT32 but can be FAT16 if only Linux systems will reside on the drive.
143101-5001Which of the following commands installs extlinux into the /boot partition? extlinux --install /boot extlinux --inst /boot extlinux -boot extlinux /boot installThe --install option is used followed by the partition to which extlinux will be installed for boot.
144101-5003Which of the following commands mounts /dev/sda1 in the /boot partition? mount /dev/sda /boot mount /boot /dev/sda1 mount /dev/sda1 /boot mount -dev sda1 /bootThe format for the mount command is [partition] [target], making option C correct. The other options are not valid because the arguments are in the wrong order.
145101-5002Which of the following can be identified as an initial sector on a disk that stores information about the disk partitioning and operating system location? Minimal boot record (MBR) Master boot record (MBR) Init sector Master partition table (MPT)The master boot record (MBR) is the first sector on a disk and contains information about the structure of the disk. If the MBR becomes corrupt, all data on the disk may be lost. The other options shown for this question are not valid.
146101-5004Which option to grub-install will place the GRUB images into an alternate directory? --boot-dir -b -boot --boot-directoryThe --boot-directory option enables you to specify an alternative location for GRUB images rather than the default /boot. The other options shown for this question are not valid.
147101-5004Within which file is a list of the currently mounted filesystems stored? /etc/fstab /etc/curmount /var/spool/files /etc/mtabThe /etc/mtab file lists the currently mounted filesystems. The /etc/fstab file lists overall filesystems for the computer but does not distinguish between mounted or unmounted filesystems. The other options listed for this question do not exist.
148101-5002Which command is used to activate swap space on a system? mkswap swapon swapact actswapThe swapon command enables swap space, making it available for use as virtual memory. The mkswap command formats the space. The other two commands are not valid.
149101-5003Which of the following commands displays information about a given physical volume in an LVM setup? pvdisp pvlist pvdisplay pvlThe pvdisplay command shows information about a given physical volume. You can use pvdisplay to view the device on which the PV is built along with the extent size of the PV. The other commands shown are not valid.
150101-5002Which of the following commands creates a logical volume with LVM? lvc lvcreate lvlist lvmakeThe lvcreate command is used to create a logical volume from previously created physical devices and volume groups. Using lvcreate is the final of three steps in the process for using LVM prior to actually using the logical volume.
151101-5001Which of the following commands looks for LVM physical volumes and volume groups involved in an LVM configuration? vgscan lvmscan lvlist pvlistThe vgscan command looks for both physical volumes and volume groups related to an LVM configuration. The vgscan command is run at system startup but can also be run manually. The other commands are not valid.
152101-5003Which of the following commands is used to display a list of physical volumes involved in LVM? pvdisp pvlist pvscan pvmmThe pvscan command displays a list of physical volumes on a given server. The PVs displayed are those that have been initialized with pvcreate for use with LVM.
153101-5001Which option to lvchange sets whether the logical volume is available? -a -b -c -dThe -a or --activate option sets whether or not the logical volume can be used. There is no -b or -c option, and the -d option is used for debugging.
154101-5003When working with a script to create directories, the script is checking to see if srv/vhosts exists. When doing an ls of the root directory, /, you see that it does exist. However, the script does not. What might be the issue? The script is not executable. The script does not have the setuid bit set. The script is using a relative path. The script is owned by root.The script is using a relative path to look for srv/vhosts rather than /srv/vhosts with an absolute path back to the root directory of the system.
155101-5002You are architecting an application and need to choose between application containerization and virtualization. Which of the following describes a difference between application containers and a virtual machine? An application container can contain only one application whereas a virtual machine can contain many.An application container shares the host kernel whereas a virtual machine can have its own kernel. An application container is used for small applications whereas a virtual machine is used for large applications. The use of application containers is for testing only whereas a virtual machine is used for production.Application containers share kernel and other resources with the underlying OS and use a container daemon to communicate between the host OS and the application container. Virtual machines have their own kernel and are self-contained machines running on top of a host OS or host kernel. Linux containers also provide a containerized virtual machine like experience but are distinct from application containers.
156101-5004In addition to including /lib and /usr/lib, where does ldconfig look to find additional directories to incorporate into the library path? /etc/lib.conf /etc/ldconf /etc/lib.cfg /etc/ld.so.confThe /etc/ld.so.conf directory is used in addition to /lib and /usr/lib to configure library locations. The other paths and files shown do not exist.
157101-5001You are working with a cloud instance virtual machine deployed with an Infrastructure as-a-Service (IaaS) provider. The virtual machine is running slowly. Which type of resource might you add to the cloud instance in order to improve performance? Compute Block storage Networking DiskAmong these options, compute resources, such as adding more CPUs, would be the most likely option. Adding RAM might also be warranted, but that was not one of the available options for this question. There is no indication in the question that the network is slow, and there is no indication that adding disk space or block storage (which are essentially the same thing in this context) will help.
158101-5001When working with a system to determine if it is using GRUB or GRUB2, the presence of which file indicates that it is GRUB2? grub.cfg grub.conf menu.lst grub2.confGRUB 2 uses grub.cfg whereas GRUB uses menu.lst and grub.conf, making option A the correct choice.
159101-5002You are working to create a system image or template from which other virtual machines will be deployed. Which of the following represents a unique item that will change with each deployed virtual host or image? System directories MAC address Guest drivers Pilot homingThe MAC address will be unique for each virtual machine deployed using the image. Guest drivers would usually not be unique to an individual virtual machine but might be unique on a per-template or per-image basis. System directories are not unique per virtual machine, and there is no such thing as pilot homing in this context.
160101-5002Which program can be used to deploy an Ubuntu image to a remote cloud provider? dep-image cloud-init init-cloud image-depThe cloud-init program is available on Ubuntu and other distributions and can be used to deploy images to popular cloud providers.
161101-5003Which file is used as the primary configuration file for the yum package manager? /etc/yum.cfg /etc/yum.d /etc/yum.conf /etc/yum.configThe yum package manager configuration file is /etc/yum.conf. The other files listed do not exist.
162101-5002Which of the following commands and options lists all of the files included with a package on a Debian system? apt -L dpkg -L dpkg -f apt-get showThe -L option to dpkg lists the files included with a given package. The -f option to dpkg shows a field from a package entry, and the other options do not exist.
163101-5001When working with SSH (Secure Shell) keys for a virtual machine cloud deployment, which key is deployed to the virtual machine so that you can connect from the host? The public key The signature file The private key Both the public and private keysThe public key is deployed to the authorized_keys file on each image, and the private key is used from the host to connect to each virtual machine. There is no reason to deploy the private key to the virtual machine in order to make a connection to it.
164101-5001When using a GPT disk, which partition needs to be created for a Linux system to boot? /boot/efi /boot/gpt /gpt /vmgptThe /boot/efi partition needs to exist for the EFI partition and is typically sized 100MB to 250MB, though that size can vary.
165101-5001Which option to zypper installs a package? install retr get refThe install option, or simply in, will install a package on a system that uses zypper for package management. Among the other options listed, the ref option refreshes the repository. The other options are not valid with zypper.
166101-5004You are working with a Fedora 22 system and need to install a package. Which of the following is the default package manager on this system? yum apt dpkg dnfA system running Fedora 22 will use the dnf package manager by default. The yum package manager is used on CentOS and Red Hat, and apt and dpkg are used on Debian.
167101-5001You need to list the files available on a package on CentOS. Which of the following commands accomplishes this task? repoquery -l pkgquery -l dpkg -L pkglistThe repoquery command with the -l option is used for this purpose. The dpkg -L command is appropriate for this purpose on Debian systems. The other commands do not exist.
168101-5003You need to create a backup of user home directories including root. Which directory or directories need to be included in the backup? /home /home and /home/root /home and /root /home and /root/homeHome directories for normal users are in /home and the home directory for root is at /root, making option C correct.
169101-5001In which file can you find the unique D-Bus machine ID for a given system? /etc/machine-id /etc/machineID /etc/mch.conf /etc/machine.id.confThe /etc/machine-id file contains the unique identifier for a given machine.
170101-5001Which option to ldconfig can be used to process only those directories given on the command line rather than the directories found in /etc/ld.so.conf? -n -i -v -rThe -n option tells ldconfig to process only the directories given on the command line. The -i option ignores the auxiliary cache file. The -v option is verbose, and -r changes the root directory from which to begin processing.
171101-5003When working with package caches on Debian, you need to determine if the package list is being updated. Which option to apt-cache shows the number of available packages on the system? packagenum status stats liststatusThe stats option shows total package names along with other information about the package cache. The other options are not valid for use with apt-cache.
172101-5004Which option to grub-install specifies the directory in which the EFI partition is located? --boot-dir --efi --efi-boot --efi-directoryThe --efi-directory option is used to specify the location of the EFI partition, typically /boot/efi.
173101-5001Within which file are mount points for the system stored? /etc/fstab /etc/mtab /etc/partitions.list /etc/disk.confThe /etc/fstab file contains a list of partitions for the system. The /etc/mtab file contains currently mounted partitions. The other files do not exist.
174101-5002Which of the following option sets for rpm lists the files within the package? lf qlp qf epsThe options qlp list the files in an rpm package. The other options are not valid for the purpose described in the question.
175101-5002When working with a CentOS system, you need to determine the release of a certain package. Which command and option will accomplish this task? dpkg -i yum info yum search apt searchAmong the commands and options shown, the info option to yum is used for this purpose. The dpkg and apt package managers are used on Debian systems and thus would not be appropriate for a CentOS system.
176101-5001You are using a host machine and are unsure if it supports the extensions to enable virtualization. Which of the following should you look for in /proc/cpuinfo to indicate that the system is ready for virtualization? vmx virt envirt vtcapableThe presence of the string vmx in the flags section indicates that an Intel processor is capable of virtualization. This extension is called svm on an AMD architecture.
177101-5001Within which file can you configure a filter for devices when using vgscan? lvm.conf vg.conf vgscan.conf lv.cfgThe lvm.conf file is a primary configuration file for LVM. Within lvm.conf, typically found in /etc/ or /etc/lvm/, you can set things like filters for devices to include or exclude from the vgscan process. The other files shown are not valid.
178101-5003Which of the following swapon options displays information on the size of swap space along with its used space? --list -a --show -hThe --show option displays information about the swap spaces on the computer, including how much swap is currently being used. The -a option activates all swap spaces. There is no --list option, and -h displays help.
179101-5004Assume that youre using the Bash shell and want to prevent output redirects from accidentally overwriting existing files. Which command and option can be used to invoke this behavior? setoutput -f overwrite=no overwrite -n set -CThe set command can be used for a variety of purposes to change how the shell environment works. One such option is C, which prevents output redirection such as that done with > from overwriting a file if the file already exists.
180101-5002What command can be used to view the current settings for your environment when using Bash? environment env listenv echoenvThe env command will print the current environment variables from Bash. The printenv command will perform the same operation. The other commands listed in this question do not exist.
181101-5003Which command is used to access documentation on the Linux computer for a given command? doc heredoc man manualThe man command displays documentation for the command given as the argument. The other options listed for this question do not exist.
182101-5004Which of the following commands will print various information about the kernel and architecture, along with other details? info --sys man sys sysinfo uname -aThe uname command is used to print system information, and the -a option prints all information available to uname.
183101-5001When using sed for a substitution operation, which option must be included so that the substitution applies to the entire line rather than just the first instance? g a r yThe g option, also known as global or greedy, will apply the matched operation to the entire line rather than just the first instance of the match. The other options apply as they would for a Perl-Compatible Regular Expression. Note also the tr command that provides some of the same functionality as sed.
184101-5003Which option for the wc command prints the number of lines given as input? -f -a -l -oThe -l option provides the number of lines given as input. For example, wc -l /etc/ passwd would print the number of lines in the /etc/passwd file. The other options given in this question are not valid for the wc command.
185101-5003What is the default number of lines printed by the head and tail commands, respectively? 10 for head, 5 for tail 5 for head, 10 for tail 10 for both head and tail 3 for both head and tailBoth head and tail print 10 lines of output by default.
186101-5002You are attempting to use rmdir to remove a directory, but there are still multiple files and other directories contained within it. Assuming that youre sure you want to remove the directory and all of its contents, what is the command and arguments to remove the directory and all of its contents? rm -f rm -rf rmdir -a rmdir -mThe -rf options to rm will recursively remove the contents of a directory, including other directories. The -f option alone will not work in this case because of the additional directories. The other options given for rmdir do not exist.
187101-5004Which command will find directories with names beginning with 2014 located beneath the current directory? find ./ -name "2014"find ./ -type d -name "2014"find / -type d "2014"find ./ -type d -name "2014*"The -type option causes find to limit its search to directories only, whereas the -name option limits the names of returned elements. Note the use of the wildcard due to the phrasing of the question. Also note the use of ./ to denote beginning the search in the current directory.
188101-5001Which of the following commands will provide the usernames in a sorted list gathered from the /etc/passwd file? cat /etc/passwd | awk -F : '{print $1}' | sort sort /etc/passwd | cut echo /etc/passwd cat /etc/passwd | awk '{print $1}' | sortThe cat command will display the contents of file /etc/passwd and then pipe that output to the awk command. The awk command then parses its input, splitting along the specified separator for /etc/passwd, which is a colon (:). The output is then printed and piped to the sort command. The sort command in option B will not work because the cut command requires an argument. Likewise, the echo command in option C will only echo /etc/passwd to STDOUT.
189101-5003Which options to ls will produce output, including hidden (dot) files, in a list that is ordered such that the newest files are at the end of the output? -la -lat -latr -ltrThe -l option for ls produces long or listed output and -t sorts by time stamp. The -r option reverses the order, and -a is needed to include hidden (dot) files, making option C correct.
190101-5001What will be the result if the touch command is executed on a file that already exists? The access time stamp of the file will change to the current time when the touch command was executed. The file will be overwritten. There will be no change.The file will be appended to.The time stamp of the file will change when touch is run on a file that already exists.
191101-5004Which option to both mv and cp will cause the command to prompt before overwriting files that already exist? -f -Z -r -iThe -i option will cause both cp and mv to be interactive, that is, prompt before overwriting. The -f option will force the command to run, whereas -r is recursive.
192101-5003Which of the following commands will send the contents of /etc/passwd to both STDOUT and to a file called passwordfile? cat /etc/passwd > passwordfile var /etc/passwd | passwordfile cat /etc/passwd | tee passwordfile echo /etc/passwd | stdout > passwordfileThe tee command will send output both to STDOUT and to the specified file, making option C correct. Option A will redirect output to the correct file but not to STDOUT simultaneously. The other options will not work for this question.
193101-5001The current hierarchy on the server contains a directory called /usr/local. You need to create additional directories below that are called /usr/local/test/october. Which command will accomplish this task? mkdir -p /usr/local/test/october mkdir /usr/local/test/october mkdir -r /usr/local/test/october mkdir -f /usr/local/test/octoberThe -p option will cause mkdir to create additional levels of directories without error. Running mkdir without options will not work in this case. The -r and -f options to mkdir do not exist.
194101-5002Which option to the cp command will copy directories in a recursive manner? -v -R -Z -iThe -R option will copy directories recursively. Note that if the -i option is not enabled, the recursive copy will overwrite files in the destination. The -v option adds verbosity but does not cause any recursion, and the -Z option does not exist.
195101-5003You have received a file that does not have a file extension. Which command can you run to help determine what type of file it might be? grep telnet file exportThe file command can be used to determine which type of file is being used. This can be particularly helpful for files without extensions where you are unsure if you should view the contents of the file. Option A, grep, is used to look within files but would not be helpful in this case. The telnet and export commands are not used for this purpose.
196101-5003Which command will create an image of the /dev/sda1 disk partition and place that image into a file called output.img? dd if=sda of=/dev/sda1 dd if=output.img of=/dev/sda1 dd if=/dev/sda1 of=output.img echo /dev/sda1 > output.imgThe dd command is used to create disk images, among other things. In this case, the input file is /dev/sda1 and the output file is output.img. Its also common to add the blocksize option by using the bs argument, such as bs=1M.
197101-5002What is the default delimiter used by the cut command? Colon Tab Space CommaThe cut command uses Tab as its default delimiter. This can be changed with the -d option.
198101-5001Which of the following will unzip and extract the contents of a file that has been tarred and gzipped? tar -zxf <file.tgz> tar -xf <file.tgz> tar -vz <file.tgz> tar -fd <file.tgz>The -z option will unzip the file, -x will extract from the tar archive, and -f is used to indicate the file on which to perform the aforementioned operations. Its typical to add -v for verbose output as well.
199101-5004What command is used to bring a command to foreground processing after it has been backgrounded with an &? bg fore 4g fgThe fg command will bring a command to the foreground if it has been backgrounded with either & or with the bg command.
200101-5002You need to write a script that gathers all of the process IDs for all instances of Apache running on the system. Which of the following commands will accomplish this task? ps auwx | grep apache pgrep apache processlist apache ls -p apacheWhile the ps auwx command combined with grep will provide information on the running Apache instances, it will provide much more information than is required or useful for this problem. The pgrep command provides only the process IDs and therefore meets the criteria presented in the question.
201101-5004Which of the following command lines would monitor a single process called nagios in a continuous manner? top -n 1 top -p 23 ps -nagios top -p`pidof nagios`The top command is used to continuously monitor things like CPU and memory usage, and the -p option monitors a single process. By using the runquotes with the pidof command, the process ID is provided as input to the -p option.
202101-5004Users are reporting that various programs are crashing on the server. By examining logs, you see that certain processes are reporting out-of-memory conditions. Which command can you use to see the overall memory usage, including available swap space? tree pgrep uptime freeThe free command displays overall memory usage for both RAM and swap and can be used to determine when additional memory might be needed.
203101-5001You are using the Vi editor for changing a file and need to exit. You receive a notice indicating "No write since last change". Assuming you want to save your work, which of the following commands will save your work and exit Vi? :wq :q! dd xYou need to write the changes to the file; therefore youll need :w. The addition of q will also quit. Note that you could use ZZ to write and quit as well. The dd command deletes a line, and x deletes a single character.
204101-5004What option is used to change the number of lines of output for the head and tail commands? -l -f -g -nThe -n option changes the number of lines of output for both head and tail to the number specified. The other options listed in this question are not valid for head, and the -f option follows a file with tail as the file grows.
205101-5001Which command can be used to determine the current load average along with information on the amount of time since the last boot of the system? uptime sysinfo bash ls -uThe uptime command shows basic information such as that described along with the number of users logged into the system and the current time. The bash command is a shell environment, and the ls command will not display the required information.
206101-5004You need to start a long-running process that requires a terminal and foreground processing. However, you cannot leave your terminal window open due to security restrictions. Which command will enable you to start the process and return at a later time to continue the session? fg bg kill screenThe screen command starts a new terminal that can be disconnected and reconnected as needed. Processes running from within the screen session do not know that they are running in a screen session and therefore meet the criteria needed to satisfy this question. The fg and bg commands will not meet the criteria, and the kill command will stop a process.
207101-5003You have attempted to stop a process using its service command and also using the kill command. Which signal can be sent to the process using the kill command in order to force the process to end? -15-f -9-stopThe -9 option invokes SIGKILL, which will force the process to end. The 15 signal is the default, and the -f and -stop options do not exist.
208101-5003When working in the Bash shell, you need to redirect both STDOUT and STDERR. Which of the following commands will redirect both STDOUT and STDERR?1>2 >2 2>&1 >>Within Bash, the number 1 represents STDOUT and 2 represents STDERR. Redirecting both means combining them in the manner shown in option C.
209101-5002Which command can be run to determine the default priority for processes spawned by the current user? prio nice renice defpriorityThe nice command, when run without arguments, will output the priority for the currently logged-in user, which is normally 0. The renice command can be used to change the priority of running processes. The other two commands shown as options for this question do not exist.
210101-5004Which of the following egrep commands will examine /etc/passwd to find users who are using either /bin/bash or /usr/bin/zsh for their shell environment? grep sh /etc/passwd egrep '/*/.sh$' /etc/passwd grep '/*/.=sh$' /etc/passwd egrep '/*/..?sh$' /etc/passwdWithin a regular expression, * represents 0 or more characters. In this case, it doesnt matter whether a person is using /bin/bash or /usr/bin/zsh. Likewise, a . matches a single character, but in the case of bash and zsh, we need to look at the first and then optionally a second character. The ? character makes the second . optional. Finally, the $ anchors the pattern at the end of the string and is also the key for this regular expression.
211101-5001Which option to the man command accesses a different level of documentation, for example, system call documentation? man 2 <argument> progman <argument> man --sys <argument> man --list sysThe different levels of the manual are accessed by preceding the argument with the desired level. The other options, such as --list, do not exist in this context.
212101-5003When editing with Vi, which command changes to insert mode and opens a new line below the current cursor location? f a o iThe o command opens a new line below the current cursor location. The a command begins an insert mode session at the character after the cursor, not the line. The i command begins an insert mode session at the current cursor location.
213101-5001Which kill signal can be sent in order to restart a process? -HUP -RESTART -9-SIGSending -HUP as part of the kill command will restart a process. Of the other options, a -9 will kill the process completely. The other two options do not exist as valid means to kill a process.
214101-5002Which of the following commands will display the last 50 lines of your command history when using Bash, including commands from the current session? bashhist 50 history 50 cat .bash_history tail -f .bash_historyThe history command will display your command history, including commands from the current session. You can specify how many lines of history to display, as shown in the answer for this question. Note that .bash_history will not show the current sessions history.
215101-5003You have backgrounded several tasks using &. Which command can be used to view the current list of running tasks that have been backgrounded? procs plist jobs freeThe jobs built-in command shows the list of jobs running in the background. Its output includes a job number and the status of the job.
216101-5002Which of the following commands searches each users .bash_history file to determine whether the user has invoked the sudo command? find /home -name "bash_history" | grep sudo find /home -name ".bash_history" | xargs grep sudo find /home/.bash_history | xargs grep sudo find /home -type history | xargs grep sudoThe find command, beginning with the path and then the -name argument, will locate all of the files called .bash_history. The output from the find command should be piped to xargs, which can then build further commands from standard input. Note that this question and solution assumes that all users use the Bash shell and are keeping history.
217101-5003Which command will watch the Apache log at /var/log/httpd/access.log and continually scroll as new log entries are created?watch /var/log/httpd/access.log tail /var/log/httpd/access.log tail -f /var/log/httpd/access.log mon /var/log/httpd/access.logThe tail command provides the end portion of the file given as an argument. Adding the -f option will cause the output to update as new lines are added to the file being tailed.
218101-5004You are debugging a configuration file and the daemon indicates there is a problem on line 932. Which of the following commands will prepend line numbers onto the file? lines wc -l newline nlThe nl command will prepend line numbers onto the file given as its argument. The output is then sent to STDOUT. Of the other options, wc -l will print the number of lines in the file but not prepend those numbers onto each line, as was asked for in this question.
219101-5001You receive a file with an .lzma extension. Which command can you use to decompress this file? xz lz gz bzipThe xz command can compress and decompress files in a variety of formats, one of which is lzma.
220101-5001Which find command will locate files within the current directory that have been modified within the last 24 hours? find ./ -type f -mtime 0 find ./ -type f -mtime 24 find ./ -type f -mtime +1 find ./ type -f time 24The find command will be used for this purpose. Adding -type f will limit the search to only files and the -mtime option will limit to modification time in day format.
221101-5003Which command will move all files with a .txt extension to the /tmp directory? mv txt* tmp move *txt /temp mv *.txt /tmp mv *.txt tmpThe mv command is used to move files, and *.txt will look for all files with a .txt extension. Note the fully qualified destination with a / preceding the name tmp.
222101-5004Which command prints your current directory? cwd curdur cd pwdThe pwd command prints the current working directory. The cd command changes directory.
223101-5001Assume that you have a file called zips.txt that contains several postal ZIP codes and you need to determine how many unique ZIP codes there are in the file. Which of the following commands can be used for that purpose? sort zips.txt | uniq -c uniq zips.txt count zips.txt cat zips.txt | uniq -cThe file needs to first be sorted to group common ZIP codes together. After that, piping the output to uniq will display the unique ZIP codes, and the -c option provides a count.
224101-5001When using Bash, how would you execute the last command starting with a certain string, even if that command was not the last one that you typed? Precede the command with ! and then the string to search for. Search for the command in history. Precede the command with a ? and then the string to search for. This is not possible with Bash.Preceding the command with a ! will search history and execute the specified command. For example, !vi will start your last Vi session.
225101-5003Which command can be used to kill all processes by using their name? killproc killname killall kill -fThe killall command is used to terminate processes using their name.
226101-5003Youre working with a large file in Vi and need to search for instances of a string earlier in the file. Which key will search backward in the file? / h ? xThe ? key will search backward in a file within Vi. The / is used for searching forward. The h key moves the cursor to the left one character, and the x key will delete a character.
227101-5004You need to declare a local environment variable that will then be available to child processes. Which of the following commands accomplishes this task? ex echo dec exportThe export command makes an environment variable available to subsequent child processes. The other commands shown are not valid.
228101-5002You are creating a Bash shell script and need to output the current script name to the current terminal. Which of the following commands accomplishes this task? cat <CMD> echo $0 echo $SCRIPT echo $PS1The echo command sends output and $0 is the parameter that contains the current script name. Of the other options, $PS1 is the shell prompt and the other two options do not exist by default.
229101-5002You have downloaded a file with a .gz extension. What is the most likely command that you will use to decompress this file? unz gunzip hunzip gzunzipThe gunzip command is typically used for decompressing files with a .gz extension. The other options are not valid commands.
230101-5003You need to remove a single file from a directory if it exists but would like to be prompted for confirmation before doing so. Which option to the rm command causes the command to prompt for confirmation? -a -e -i -oThe -i option causes rm to use interactive mode, where the command will prompt for confirmation prior to taking action. See the (1) rm man page for additional information on the other options.
231101-5001You need to determine files that are sized above 1GB. Which of the following commands accomplishes this task? find / -size +1G find / -size 10000M find / +1M find / -size +1BThe find command can be used for this purpose. When used with the size option, various size-related options can be used. The option +1G searches for files greater than or equal to 1GB.
232101-5002Which option to cpio lists the files as it is operating on them? -l -v -k -sThe -v or verbose option lists files as cpio is working with them. Of the other options, -s is swap bytes and l is used to link files. The -k option is included for compatibility purposes.
233101-5002Which command is used to send contents of a bzip2 archive to STDOUT? bzout bzcat bz2cat bz2echoThe bzcat command sends output to STDOUT from a bzip2 archive.
234101-5003You are attempting to find more information about the jobs command; however, an Internet search was not particularly helpful because there are so many Linux-related jobs available. Additionally, you attempted to view the man page for the jobs command but it was not available. Which man page should you use to view more information on jobs? jbs procctl bash psThe jobs command is actually a shell built-in command, meaning that more information is available by using the man page for bash itself. The other options either are not valid or will not show information about the jobs command/built-in.
235101-5002You need to start a process that cannot be sent or will not accept a SIGHUP signal. Which command should be used to start the process? nosig nohup nokill noprocThe nohup command can preface another command when starting so that the process or command will not accept a SIGHUP.
236101-5004You need to run a command periodically and examine its output in real time. Which of the following commands enables this scenario? mon procmon pgrep watchThe watch command runs a command repeatedly and displays the output and errors from the command. The pgrep command does not fulfill the needs of this scenario. The mon and procmon commands are not real.
237101-5002You would like to tail a log file to watch entries as they are being added to the log file. In addition, you would also like to work within the same terminal window or SSH (Secure Shell) session to add entries to another file at the same time. Which command can be used to create two sessions within the same terminal window? screen tmux sess termseThe tmux command creates two (or more) sessions within the same physical terminal window and thus enables this scenario. The screen command can be used to create an additional session, but the screen command does not meet the criteria specified in this scenario, because the scrollback buffer does not capture enough lines by default. The other commands shown are not valid.
238101-5001You need to kill several processes at once. Rather than writing a complex ps-based command to do so, you can use which other command?pkill psk pskill prockThe pkill command can be used for the scenario described. The other options are not valid commands.
239101-5001You are using pgrep to find the process IDs for a given command. However, several other commands seem to also appear. Which option to pgrep enables matching against the full path of the process? -f -d -o -iThe -f option matches against the full path. The -d option is used to set the delimiter, the -o option matches the oldest process, and the -i option sets the search to be case insensitive.
240101-5002You need to determine the exact command that will be run based on your current environment settings. Which command is used for this purpose? what which find lsThe which command is used to determine the command that will be run based on the current environment settings such as the path. The find and ls commands will not work for this purpose.
241101-5002An environment variable has been set on login, but you need to remove that variable temporarily for the current session. Which shell built-in command can be used for this purpose?reset unset undo clearThe unset shell built-in is used for the purpose described. Both the reset and clear commands do not accomplish the task described, and there is no undo command.
242101-5001You cannot find the man page of a command but you know the command exists. For example, the alias command exists but there is no man page for it. Which of the following commands could you execute to determine what type of command alias is? type cmd uses listrThe type shell built-in displays information about a given executable. For example, the command type alias shows that alias is a shell built-in as well.
243101-5003Which type of quotes are used so that variables are interpolated within a Bash shell script? Escaped quotes Single quotes Double quotes Side quotesDouble quotes help to ensure that variables are interpolated within a shell script. Runquotes are not used for this purpose, and the other options are not valid types of quotes.
244101-5003Which of the following pagers includes the ability to search backward and forward as well as move backward and forward, line-by-line, and page-by-page? more mplus less catchThe less pager fits the scenario described. The more pager does not have as much flexibility as less. The other options shown are not valid.
245101-5003You have a specialized need for outputting a file in octal format. Which command or series of commands can be used for this purpose? oct cat <file> | octalf od octfThe od command converts a file to octal format. The other options shown all have invalid commands.
246101-5002Which option to sha256sum causes the file to be read in binary mode? -i -b -c -pThe -b option for sha256sum and sha512sum reads the file in binary mode as opposed to text mode, which is the default.
247101-5002When operating in command mode, which keys enable you to move the cursor in the Vi editor? a, s, d, f h, j, k, l q, w, e, r z, x, c, vThe h, j, k, and l keys enable movement of the cursor in command mode Vi.
248101-5003Which options to xz are functionally equivalent to the xzcat program? decompress and output output and format decompress and stdout stdout and formatThe decompress and stdout options to xz are functionally equivalent to the xzcat program. There is also a related program called zcat for outputting files compressed with gzip to STDOUT.
249101-5001Which environment variable is used to control the default text editor used on a Linux system?EDITOR EDIT TEXTEDITOR DEFAULT_EDITORThe EDITOR environment variable controls the editor that is used. Typical choices include nano, Emacs, Vi or enhanced Vi, known as Vim.
250101-5004You need to examine the seventh section of the manual page for regular expressions, or regex, on a Linux system. Which command displays the seventh section of the manual? man regex -7 man regex 7 man --page 7 regex man 7 regexThe seventh manual section for regex is found by specifying the level after the command and prior to the manual page to examine.
251101-5002Which of the following commands reprioritizes an already running process? nice renice chnice altniceThe renice command changes the priority of a running process. The nice command is not capable of altering running processes, and the other commands shown are not valid.
252101-5002The fgrep command is equivalent to running the grep command with which option? -f -F -a -EThe fgrep command is equivalent to running the grep command with an -F option. The -f option specifies a file, and the -E option utilizes an extended regular expression and is equivalent to the egrep command. The -a option is important in its own right and causes grep to process a binary file as if it were a text file.
253101-5001Which of the following regular expressions would find the pattern Steve or steve in a file when used with grep? '[sS]teve' '[S]*teve' '^[Ss]teve' '[$Steve]'All of the options shown use regular expressions. In the correct answer, the strings Steve and steve will match due to the use of a character class. Option B would match only Steve but, due to the quantifier *, would also match strings like Siwejfiwjfheteve. Option C uses anchoring and thus would only match Steve or steve at the beginning of a line. Option D also uses an anchor to indicate end of line and thus does not make sense in this context.
254101-5003Which of the following commands shows the currently running processes and their resource usage in real time, updated every few seconds? nice ps top procsThe top command shows running processes, typically sorted by CPU usage and updates every few seconds. The ps command shows processes but does not auto-update. The nice command sets priority, and there is no procs command.
255101-5001You have been asked to create a compressed file that will be readable by those with other operating systems. Which tool can you use for this purpose? gzip bzip2 xz tarFiles compressed with the gzip utility can typically be read by other operating systems, though it may require additional software for certain operating systems. Compression utilities like bzip2 and xz almost certainly require additional software. The tar command in option D is not a compression utility.
256101-5001You need to match files that begin with 201, as in 2017, 2018, 2019. Which of the following wildcard specifications can be used? 201? 201$ 201@ 201]The question mark can be used as a wildcard for such a scenario. An asterisk would also work for file globbing.
257101-5002You need to break a large file into smaller pieces. Which command can be used for this purpose? cut split dice remThe split command can break up a file into multiple pieces. The cut command would split an individual line but does not meet the criteria in this scenario. There is no dice or rem command.
258101-5003When examining the output from top, you see that a process has a value in the PR column of 20. To what does the PR column refer? The process ID The process utilization The process priority The processor core on which the process is executingThe scheduling priority of the process is shown in the PR column. The process ID is displayed in the PID column. The top command shows CPU utilization in the %CPU column and does not display information about the processor cores.
259101-5001You need to cut or remove eight lines from a file while editing with Vi. Which combination should be used for this purpose? d7 d8 r8 x7The d key will be used for this and the number 7 used in order to cut or remove eight lines. Other keys to work with text for cut, copy, and paste in Vi include p, y, dd, and yy. The other options shown for this question are not valid.
260101-5001Which command is used in order to decompress a file that has been compressed with xz? unxz dexz xzu u2xzThe unxz command decompress a file that has been compressed with xz.
261101-5004Which of the following commands uses 128-bit message digests? sha256sum sha512sum sh128sum md5sumThe md5sum command creates a 128-bit MD5 message digest. The sha256sum command produces 256-bit values, whereas sha512sum produces 512-bit values.
262101-5001You have several files that need to be combined, with a line from each file being appended onto a single line. Which command can be used for this purpose? paste comb appfile comboThe paste command fits the scenario described and separates the lines from each file by a tab. The other commands are not valid.
263101-5001You need to run a command that is not inside your current path. Which of the following represents the typical method for doing so? Use a fully qualified path for the command. Set the PATH environment variable to include the correct path. Restart the shell environment. Restart the computer for settings to take effect.Using a fully qualified path meets the scenario in the most typical manner. You could add the command path to the PATH environment variable, but that is unnecessary given the scenario. Restarting the shell or computer would not have any effect.
264101-5002Which signal is used by default by the pkill command? SIGKILL SIGTERM SIGHUP SIGKSThe SIGTERM signal is used by default by the pkill command. This can be changed using the --signal option.
265101-5004You are working with the jobs built-in command to display jobs. You would like to see only running jobs. Which option to the jobs built-in command will display only running jobs? -s -a -l -rRunning jobs are listed with the -r option. The -s option displays only stopped jobs, whereas -l shows process IDs. There is no -a option to the jobs built-in command.
266101-5003Which option to the bunzip2 command sends output to STDOUT, much like the bzcat command? -s -o -c -dThe -c option outputs to STDOUT. See the bzip2(1) man page for additional details.
267101-5001Which option best describes the following output from the ls -la command: lrwxrwxrwx. 1 root root 35 Jul 8 2014 .fetchmailrc -> .configs/fetchmail/.fetchmailrc? It is a file called .fetchmailrc that is linked using a symbolic link. It is a file called .configs/fetchmail/.fetchmailrc that is owned by lrwxrwxrwx. It is a directory called .fetchmailrc that is owned by user Jul. It is a local directory called .configs/fetchmail/.fetchmailrc.The listing shows a symbolic linked file located in the current directory, linked to .configs/fetchmail/.fetchmailrc. The file is owned by the root user and root group and was created on July 8, 2014.
268101-5001Assuming that a USB disk contains a single partition and is made available on /dev/sdb, which command mounts the disk in /media/usb? mount /dev/sdb1 /media/usb usbconnect /dev/sdb0 /media/usb mount /dev/sdb0 /media/usb usbmount /dev/sdb1 /media/usbThe mount command is used to mount drives in Linux. The source and destination mount points are expected as arguments. Drive partitions begin at the number 1, making the first partition number 1.
269101-5003Which option within a partition-mounting command will cause the partition to be mounted in such a way as to prevent execution of programs? execless stoprun noexec norunThe noexec option will prevent programs from being executed that reside on the partition. The noexec option is used frequently for mounting the /tmp partition.
270101-5002When working with partitions on disk, you see the type 0x82. Which type of partition is this? Linux Linux swap NTFS FAT0x82 is Linux swap, and 0x83 is Linux. NTFS is 0x07, and FAT is 0.0c.
271101-5002Which partition type should be created for a Linux system, non-swap partition? 828384LThe partition type 0x83 should be created for a normal Linux partition. Type 82 is used for swap; 84 is an OS/2 partition. There is no L type.
272101-5001Which command can be used to determine the location of a given executable that would be run if typed from your current environment and location? which what whatis whenThe which command returns the full path to the given command and is useful for determining both whether a given command is available and the location from which the command will run.
273101-5001Which of the following commands will correctly change the group ownership of the file called a.out to users? chgrp users a.out chgrp a.out users groupchg a.out users grpchg users a.outThe chgrp command can be used to change group ownership of a file. The order is chgrp <groupname> <target>.
274101-5003Another administrator made a change to one of the local scripts used for administrative purposes. The change was also immediately reflected in your copy of the script. However, when examining the file with ls, you see that it appears to be a normal file. What is the likely cause of such a scenario? The file was executed after edit. The administrator copied the file to yours. Your file is a hard link to the original. The file has been restored from backup.The file is almost certainly a hard link to the original script. Although ls wont show this information, the stat command will show that it is a link and also show the inode to which the file is linked.
275101-5001Which of the following commands shows the usage of inodes across all filesystems? df -i ls -i du -i dm -iThe -i option to df produces information on inodes across all filesystems. The ls -i option will produce inode listings, but only for the current directory. The -i option is invalid for du, and dm does not exist as a command.
276101-5003Youre running fsck on an ext3 filesystem, and the process is taking longer than expected and requiring input from the administrator to fix issues. What option could be added to fsck next time so that the command will automatically attempt to fix errors without intervention? -o -V -y -fThe -y option will attempt to repair automatically, essentially answering y or yes instead of prompting. Of the other options, only -V is valid and will produce verbose output.
277101-5002Which of the following describes a primary difference between ext2 and ext3 filesystems? ext3 was primarily a bug fix update to ext2. ext3 includes journaling for the filesystem. ext3 completely changed the tools needed for management of the disks. ext3 filesystems have no significant differences.The addition of journaling in ext3 increased filesystem reliability and performance.
278101-5003Which option to umask will display the permissions to be used in a Portable Operating System Interface (POSIX) format? -P -p -S -vThe -S option displays output in a format such as u=rwx,g=rx,o=rx. The other options listed do not perform the desired operation.
279101-5002Which option to ln creates a symlink to another file? -sl -s -l --lnThe -s option to ln creates a symbolic link, or symlink.
280101-5003Which of the following commands can be used if you need to locate various elements of a given command, such as its binaries and man pages? whatis find whereis lsThe whereis command displays pertinent information about the command given as its argument. For example, entering whereis apache2 on a Debian system will show the binary location, configuration file location, and other relevant details.
281101-5001Which option in /etc/updatedb.conf will remove a path from inclusion in the results? PRUNEPATHS EXCLUDEPATHS INCLUDEEXCLUDE SEPARATEPATHThe PRUNEPATHS option accepts a space-separated list of paths to remove from the results. The other options listed do not exist.
282101-5004According to the filesystem hierarchy standard (FHS), what is the correct location for site-specific data for a server? /etc /var /tmp /srvThe /srv hierarchy is used for data for server programs. The /etc hierarchy is configuration information; /var is also data files but variable, such as mail files. The /tmp directory is for temporary files.
283101-5003Which of the following commands enables the sticky bit for a user on a file called homescript.sh? chmod +sticky homescript.sh chmod 755 homescript.sh chmod u+s homescript.sh chown u+sticky homescript.shThe chmod command is used for this purpose, and the u+s option sets the sticky bit for the user on the specified target.
284101-5002Which option to the mount command will mount all filesystems that are currently available in /etc/fstab? -g -a -r -yThe -a option mounts all filesystems in /etc/fstab that are currently available. This option is typically used if the mount points are not mounted at boot time or another mount point is added to the system after it has been booted.
285101-5002Which command is used to format a swap partition? fdisk mkswap formatswap format -sThe mkswap command formats a swap partition. The fdisk command is used to create the partition itself but not format it. The other two options do not exist.
286101-5001Which command and option is used to display the number of times that a filesystem has been mounted? tune2fs -l cat /etc/fstab mount -a less /etc/fsmntThe tune2fs command displays a lot of information about filesystems, and when used with the -l option, the output includes the number of times that the filesystem has been mounted.
287101-5001Which option to xfs_metadump displays a progress indicator? -g -p -f -vThe -g option displays progress of the dump. The other options listed do not exist.
288101-5001The system is running out of disk space within the home directory partition and quotas have not been enabled. Which command can you use to determine the directories that might contain large files? du df ls locateThe du command will report on disk usage in a recursive manner, unlike the other commands shown here.
289101-5003Which file contains information about the filesystems to mount, their partitions, and the options that should be used to mount them? /etc/filesystems /etc/mounts /etc/fstab /srv/mountsThe /etc/fstab file is used to store information about the filesystems to mount within the system.
290101-5004According to the FHS, what is the proper mount point for removable media? /etc /srv /tmp /mediaThe /media mount point is used for removable media. See https://wiki.linuxfoundation.org/lsb/fhs-30 for more information on the FHS.
291101-5001Which file contains information on currently mounted filesystems, including their mount options? /etc/mtab /etc/fstab /tmp/files /etc/filesystemsThe /etc/mtab file contains currently mounted filesystems. Note that /etc/fstab contains filesystem information but doesnt report which filesystems are currently mounted.
292101-5002Which option to umount will cause the command to attempt to remount the filesystem in read-only mode if the unmounting process fails? -o -r -f -vThe -r option causes umount to attempt to remount in read-only mode. The -v option is verbose mode, and the -f option forces the operation. The -o option does not exist.
293101-5001The umask reports as 022. What is the permission that will be in effect for a newly nonexecutable created file? u+rw, g+r, w+r 75522a+rThe 022 umask will translate into 644 permissions on a new nonexecutable file.
294101-5003The locate command is reporting out-of-date information. Which command should be run in order to have the locate command update its database? locatedb -u locate -u updatedb updatelocateThe updatedb command will update the database used by the locate command.
295101-5001Which shell built-in command can be used to determine what command will be run? type when find helpThe type built-in returns the location that the shell will use in order to run the given command. The find command cannot be used for this purpose, and the other commands do not exist.
296101-5002Which option to chown recursively changes the ownership? -f -R -a -mThe -R option will perform the change ownership in a recursive manner.
297101-5004Which of the following represents the correct format for the /etc/fstab file? <directory> <device> <type> <options> <device> <type> <options> <device> <type> <options> <directory> <dump> <fsck> <filesystem> <mount point> <type> <options> <dump> <pass>The proper order is the device (UUID or partition) or filesystem to mount, followed by the mount point or directory to mount that device, followed by its type and options, and then the dump and pass settings.
298101-5001Which of the following commands is used to identify the UUID for partitions? blkid ls find catThe blkid command will show partition UUIDs. You can also get this information with the lsblk -no UUID <partition> command. The other commands shown in this question do not accomplish the required task.
299101-5001Which of the following describes the priority order for configuration files with systemd? Files in /etc/, files in /run, and then files in /lib Files in /run, files in /etc/, and then files in /lib Files in /lib, files in /run, and then files in /etc Files in /lib, files in /etc, and then files in /runPriority order for systemd configuration files are those within the /etc/ hierarchy, followed by files in the /run/ hierarchy, followed by files in the /lib/ hierarchy.
300101-5001Which options to the fsck command will find and automatically assume that it should repair errors that it finds? -y -vy -my -xyThe -y option causes fsck to assume yes instead of prompting when repairing a filesystem. The -v option is verbosity. There is no -m or -x option for fsck.
301101-5003Which option to mke2fs sets the type of filesystem to be created? -F -a -t -eThe -t option sets the filesystem type as ext2, ext3, or ext4. The mke2fs command is typically symlinked from /sbin/mkfs.ext2, /sbin/mkfs.ext3, and /sbin/mkfs.ext4. The -F option forces mke2fs to create a filesystem, and the -a and -e options do not exist.
302101-5002Which of the following files is the default configuration file for the autofs automounter? /etc/autofs /etc/auto.master /etc/autofs.conf /etc/automounter.confThe file /etc/auto.master contains the configuration for autofs. The other files listed as options are not valid for this scenario.
303101-5003Which of the following commands is used to create an ISO filesystem? mkiso mkfsiso mkisofs isofs-mkThe mkisofs command creates an ISO filesystem, which can then be written to a CD or DVD. The other commands listed are not valid.
304101-5002Which option to the tune2fs command sets the maximum mount count before the system will automatically run fsck on the partition on boot?-b -c -C -aThe -c option sets the maximum mount count. The -C option sets the current number of mounts. The -b and -a options do not exist.
305101-5004Which option to the mount command can be used to simulate the mount process without actually mounting the filesystem? -q -v -l -fThe -f option, also known as fake, is helpful for situations where you need to debug the mount process or when you need to add an entry to /etc/mtab for a previously mounted filesystem. The -l option shows labels, and -v is verbose. There is no -q option.
306101-5003When viewing /proc/mounts, you see a filesystem with the letters ro in the fourth column. To what do the letters ro refer? relative option realtime option read-only relative-onlyThe letters ro indicate that the filesystem has been mounted read-only, meaning that it is not possible to perform a write to the filesystem. The other possible option is rw, indicating that the filesystem has been mounted read-write.
307101-5003Which option to dumpe2fs displays the bad blocks for a given partition? -bb -C -b -fBad blocks are shown with the -b option. The -f option forces dumpe2fs to perform the requested operation, and the other command options do not exist.
308101-5004Which of the following filesystem types features copy-on-write? ext3 ext4 FAT BtrfsBtrfs is based on the copy-on-write principle and is generally considered more advanced than ext4 and its predecessors. FAT is a legacy filesystem primarily used for DOS and its follow-ons like Windows.
309101-5002Which of the following commands displays filesystem geometry for an XFS filesystem? xfsinfo xfs_info xfs -info xfs --infoThe xfs_info command, which is functionally equivalent to xfs_grow -n, displays information about an XFS-formatted filesystem.
310101-5001Which of the following commands can be used to display information such as the UUID for partitions on a system? blkid blockdev devinfo uuidinfoThe blkid command shows information about partitions including their type, their UUID, and other basic information. The other commands shown do not exist.
311101-5003Which option to the umount command will cause it to unmount only filesystems of the specified type? -v -f -t -aThe -t option, which can accept a comma-separated list of types, specifies that only filesystems of the listed type are to be unmounted. This is useful in conjunction with the -a option, which unmounts all filesystems except /proc. The -v option is verbose, and -f forces the operation to continue.
312101-5004Which command causes unwritten data to be written to disk immediately? write wrnow connwrite syncThe sync command writes unwritten data to the disk immediately and is useful to run just prior to attempting an unmount operation.
313101-5003Which option to xfs_check is used to verify a filesystem that is stored in a file? -v -a -f -dThe -f option specifies that xfs_check should check the contents of the named file for consistency. The -v option sets verbosity, and there is no -d or -a option.
314101-5002Which option to debugfs causes the filesystem to be opened in read-write mode rather than the default read-only? -rw -w -r -nThe -w option causes debugfs to open the filesystem in read-write mode. There is also a -c option to open in catastrophic mode for filesystems with significant damage. The -rw, -r, and -n options are not valid.
315101-5004Which daemon is responsible for monitoring Self-Monitoring, Analysis, and Reporting Technology (SMART)-compatible hard drives? smartmon smarty sartd smartdThe smartd daemon monitors SMART-compatible disks for notable events and can be configured to send alerts when events occur. The other commands listed are not valid for this scenario.
316101-5001When checking an ext3 filesystem, which option to the fsck.ext3 command causes it to run the check even if the filesystem is apparently marked as clean? f -m -a -cThe -f option forces fsck to run on an otherwise clean filesystem for ext3 filesystems. This can be helpful for times when you suspect there is an error on the filesystem and need to verify the integrity of the filesystem as part of the troubleshooting process. This can also be helpful to prepare the filesystem for conversion, such as might be the case with a tool like btrfs-convert.
317101-5001You are performing an xfsrestore. The xfsdump was executed with a block size of 4MB. Which option do you need to invoke on xfsrestore in order for it to successfully use this dump? -b 4M -g 1M -i 1M -k 1028KThe block size for import or restore must match the block size used on export or dump. Block size is specified with the -b option, making option A correct. The other options are not valid for xfsrestore.
318101-5002You see the word defaults within /etc/fstab. Which options are encompassed within the defaults? ro, exec, auto rw, suid, dev, exec, auto, nouser, async rw, exec, auto, nouser, async rw, exec, nouser, async, noauto, suidA filesystem with the word defaults for its mount options will be mounted read-write (rw), suid, with the ability to have executables (exec). The filesystem will be auto-mounted (auto), but users will not be able to mount it (nouser). Character and block special devices will be interpreted (dev), and operations on the disk will be performed in an asynchronous manner (async).
319101-5002Which of the following commands creates a btrfs subvolume? btrfs create subvolume btrfs subvolume create btrfs sv create btrfs svcreateThe btrfs subvolume create command creates a btrfs subvolume. The other commands are not valid.
320101-5003Which of the following options to xfsdump sets the maximum size for files to be included in the dump? -p -s -z -bThe -z option sets the maximum size for files to be included in the dump. The -b option sets the block size but is not related to what is being asked for in this scenario. The s option sets the path for inclusion in the dump, and -p sets the interval for progress indicators.
321101-5003Which option to the tune2fs command sets the behavior when a filesystem error occurs? -f -d -e -kThe -e option sets the behavior, such as continue, remount read-only, or panic, when an error occurs at the filesystem level. The -f option forces whatever operation youre requesting to continue even if there are errors. The -d and -k options are not valid.
322101-5004The /etc filesystem has been mounted as a read-only for a recovery process. You need to mount another partition. Which option to the mount command causes it to not write to /etc/mtab? -a -m -b -nThe -n option causes mount to not write to /etc/mtab and is particularly useful for the scenario described. The -a option mounts all filesystems in /etc/fstab. There is no -b or -a option.
323101-5001Which of the following commands deactivates swap space? swapoff swap -off unmountswap uswapThe swapoff command deactivates swap space, thereby making it unavailable as virtual memory on the system. The other commands shown as options are not valid.
324101-5001Within the [mount] section of a systemd mount unit, which directive specifies the location for mounting the chosen filesystem? Where= Location= List= Dest=The Where= directive specifies the location for the final mounted filesystem.
325101-5001Which of the following commands can be used to format a FAT filesystem? mkfs.fat mkfs -f mkfs --fat mkfatThe mkfs.fat or mkfs.vfat commands are valid for creation of FAT filesystems. There is no -f option to mkfs, and there is no mkfat command.
326101-5004Which of the following commands adds a journal to an existing ext2 filesystem? tune2fs -jrn e2fs -x tune3fs tune2fs -jThe tune2fs command is used for working with ext2, ext3, and ext4 filesystems. The -j option adds a journal. The other commands are not valid.
327101-5001Which of the following commands creates a snapshot of a btrfs subvolume? btrfs subvolume snapshot btrfs snapshot --create btrfs create snapshot btrfs --createThe snapshot subcommand of btrfs subvolume creates a snapshot. The other commands shown are not valid.
328101-5001Which option to xfs_repair will force log zeroing even if there may be metadata within the log? -L -v -d -VThe -L option forces the log to be cleared or zeroed out, which may cause a loss of data. The -v option sets verbose output; -V prints the version. The -d option performs a dangerous repair, which can be used on a read-only filesystem.
329101-5003Which of the following commands mounts a filesystem in read-only mode? mount read-only mount --read mount -o ro mount -orThe -o option enables the setting of one or more options for the mount command, and ro is read-only. Note that the -r option will also mount as read-only. The other options shown are not valid.
330101-5002When you are using tune2fs to set an extended option such as stripe_width, which command-line option is needed to signify that an extended option follows? -extend -E -e -fThe -E option signals that an extended option follows, such as stripe_width. The -f option forces an operation but should not be necessary for this solution, and the -e option sets the behavior on error. There is no -extend option.
331101-5001Which utility is used for formatting GPT disks? gdisk gptdisk gpdisk pgdiskThe gdisk utility is the equivalent of fdisk for working with GPT partitions. Later versions of fdisk can also be used to manage GPT partitions.
332101-5001What is the maximum size of a partition on an MBR-formatted disk? 2TB 4TB 2MB 512TBThe maximum size for a partition on an MBR disk is 2 terabytes. GPT has largely replaced MBR on newer Linux systems.
333101-5003Which option to mkfs.ext4 can be used to prevent reservation of blocks for system or superuser use? -r 0 -r 0b -m 0 -m 0bThe -m option with 0 will format the partition with no reserved blocks for superuser or system use. The -r option sets the filesystem revision.
334101-5002What is the default time in seconds that xfs_fsr will use to reorganize a filesystem? 36007200864005150The default time for filesystem reorganization is two hours, or 7200 seconds.
335101-5003A user who is a member of the custom admins group is attempting to read the contents of a file but is not the owner of the file. Rather than granting sudo access to this file, what is another way to grant read access, assuming that the file is currently marked with 640 permissions? Note that you should choose the most appropriate answer to fulfill the need while minimizing additional privileges. Grant root access to the user. Run chmod 777 on the file. Use chgrp to change group ownership to admins. Use chown to change the ownership of the file to the individual user.The file permissions are 640, meaning that the group owner can read the file. Therefore, changing group ownership should have the fewest side effects. Granting root access is not preferred, especially noting that the problem statement indicated that granting sudo wasnt preferred. While using chown on the file to change the owner would also work, its likely to have additional side effects that could prevent the owner of the file from reading and writing, and there isnt enough information in the problem for that. Finally, running chmod 777 is almost never the correct solution to any problem on Linux.
336101-5002Which option to lsblk shows empty devices? -g -a -r -yThe -a option shows all devices, even those that are empty. The -r option is for raw devices, and the other options do not exist.
337101-5004The /media/ mount point is used frequently for which types of devices? Hard drives SAN NAS USB devicesUSB devices and others removable media can typically be found within the /media/mount point.
338101-5003Which of the following commands is used to format an exFAT filesystem? mkexfat mkfat.ex mkfs.exfat mkfs2.exfThe mkfs-related commands are typically used for formatting filesystems on Linux. In this case, mkfs.exfat is the correct option for formatting exFAT filesystems.
339101-5003Which of the following commands is used for debugging an XFS-formatted filesystem? debug_xfs xfs_debug xfs_db debugxfsThe xfs_db command is used for debugging XFS-formatted filesystems.
340101-5003Youre working with an ext2 filesystem and you suspect the superblock is corrupted. Which option to e2fsck enables you to specify the location of an alternate superblock? -B -s -b -oThe -b option is used to specify an alternate superblock and helps in the scenario described, where the superblock has been damaged. The -B option specifies the block size. There is no s or -o option for e2fsck.
341101-5001Which option to df shows the numerical output in larger size increments, like MB, GB, TB, and so on rather than in bytes? -h -m -n -sThe -h option is the flag for human-readable formatting and shows numerical output in larger size increments rather than bytes. The other options are not valid for df.
342101-5002Assuming the use of Bash for the shell, in which file can the umask be set such that the file creation mask is set automatically on login? /etc/umask.def /etc/profile /etc/bash.d/umask /etc/bash.umaskThe /etc/profile file is one of a few locations in which default options can be set for users of Bash. The other file locations shown do not exist.
343101-5001You need to enable two users to edit the same file but keep their own individual changes. Another administrator suggested making a symbolic link for the file. Is a symbolic link the appropriate solution for this scenario and, if not, what is? A symbolic link is not appropriate because the users cannot keep their own changes. A copy would be a better option. A symbolic link is appropriate here because each user can access the file, assuming write permissions. A symbolic link is not appropriate given that the users will not have permissions on symbolic links. Linux cannot meet the scenario described. A symbolic link is appropriate because symbolic links have the ability to do version control, thus enabling the scenario.A symbolic link will not work. The users would be editing the same file and, without saving as a different filename, would not be able to keep their own edits.
344101-5002You have deleted a user from the system and want to determine if this user still has files on the system. Which command will fulfill this scenario? locate <user> find -uid <uid> find -user <user> fileloc -user <user>The find command will be used for this purpose, and the -uid option will need to be used because the user has already been deleted. If the user had not been deleted, then the -user option would still work.
345101-5001You need to update the locate database. Which of the following commands is used for this purpose? updatedb locatedb updlocdb locdbupdThe updatedb command is used to update the locate database. The other commands are not valid.
346101-5002Which option to lsblk shows the UUID of each filesystem? u -f -o -aThe -f option shows the UUIDs of the filesystems mounted on the system. The -a option shows all devices, the -o option enables specification of output columns, and the -u option does not exist.
347101-5003Which option to mkswap checks the device for bad blocks before formatting? -b -B -c -dThe -c option checks for bad blocks before formatting. The other options are not valid with mkswap.
348101-5004You are examining output from ls -la and one file contains the permissions -rwSrw-r--. To what does the S refer? Specific execute Source formatting Selective execution Sticky bitThe sticky bit has been set on the file as denoted by an uppercase S.
349101-5003You need to change file permissions to be setgid for a file called sync.sh. The file is normally permission 755. Which of the following commands accomplishes this task? chmod 2775 sync.sh chmod u+s sync.sh chmod 2755 sync.sh chmod 4755 sync.shUsing octal form, 4 is user, 2 is group, and 1 is sticky bit. Therefore, 2755 would have setgid for the file.
350101-5003Which of the following commands finds files with a .sql extension across the entire filesystem? find . -name "*.sql"find /root -ext sql find / -name "*.sql"find / -exten ".sql”The -name option is used for this purpose, and / indicates the root of the system. A * wildcard is used to indicate all filenames ending in .sql, as described in the scenario.
351101-5002When working with /etc/fstab to mount by UUID, which syntax is correct as the first column in /etc/fstab, assuming a UUID denoted by <UUID>? <UUID> UUID=<UUID> ID=<UUID> GPT=<UUID>The UUID=<UUID> syntax is correct for the /etc/fstab file.
352101-5003Which option to du displays information on inode usage? -i -h --inodes -dThe --inodes option shows inode usage with du. The -h option is human-readable, and -d sets the maximum depth. There is no -i option for du.
353101-5001Which of the following find commands will look for files that are over 1GB in size? find -size +1G find -size 1GB find -fssize +1GB find -filesize +1GThe -size option is used with find for this purpose, and the +1G argument will look for files greater than 1 gigabyte. Note that if the + is omitted, only files of the exact size are found.
354101-5002You have a set of libraries that were installed into /usr/local/lib and would like to ensure that the libraries are also available in /usr/lib. What is the preferred way to make the libraries available in this location? Copy the libraries. Create a symbolic link. Move the libraries. Create a script to synchronize the libraries between the two locations with rsync.A symbolic link is the preferred method because it does not require additional maintenance that a script would or that copying would in order to keep the libraries current. Moving the libraries may have unintended consequences if another program is dependent on the libraries in that location.
355102-5002Which of the following best describes the PS1 environment variable? PS1 is used to set the location of the PostScript command. PS1 is used to define the default shell prompt for bash. PS1 is used as a per-system variable. PS1 is user-defined and does not have a default value or setting.The PS1 variable usually has its default set in /etc/profile and is used as the shell prompt. Users can customize the prompt to include hostname, working directory, and other elements.
356102-5003Which command is used to read and execute commands from a file in the Bash shell? run execute source funcThe source command is used to execute commands from a file. A typical use case is to create functions or variables that are then available for use within the current session. The other commands listed do not exist.
357102-5002You need a command to be executed on logout for all users. Within which file should this be placed (assuming all users are using Bash)? /.bash_logout /etc/bash.bash_logout /home/.bash_logout /etc/bash_logoutWhile its true that every user has a .bash_logout in their home directory, that file can still be edited by the user. Therefore, to ensure that the required command is executed at logout, the /etc/bash.bash_logout file must be used.
358102-5002Which of the following commands removes an environment variable that has been set? profile --unset env -u set -u importThe env -u command will unset an environment variable for the current session. The unset command can also be used for this purpose.
359102-5003Which option to the unset command explicitly informs the command that the name given refers to a shell variable and not a function? -a -s -v -eThe -v option, which is the default, tells unset that the name given is a shell variable rather than a function. The other options shown do not exist.
360102-5001Which of the following commands ensures that the -la options are used when the ls command is executed without other options? alias ls="ls -la ln -s ls ls -la alias "ls -la" = ls set lsThe alias command is used for this purpose and its format is name=value, making option A correct. The ln command cannot be used for this purpose because it will not accept command-line arguments for the target in such a format, as shown in the options.
361102-5002What is the order in which user configuration files are located on login to a Bash shell? .bash_login, .profile, /etc/profile .bash_profile, .bash_login, .profile .profile, .bash_login, .bash_profile .bash_login, .bash_profile, .profileUser-based configuration files are located in the order .bash_profile, .bash_login, and .profile. Only the first file found is executed and the others are ignored.
362102-5003Which variable within a Bash script is used to access the first command-line parameter? $ARG $CMD $1 $ARG0The $1 variable is automatically available within Bash scripts and represents the first command-line argument. The other variables listed in this question do not exist by default.
363102-5004Which of the following provides the end for an if conditional in a Bash script? ex } ] fiThe fi construct is used to indicate the end of an if conditional within a Bash script. In many languages, if conditionals are scoped by braces such as { }, but in shell scripting, fi is used to denote the end of the condition.
364102-5002Which of the following commands will print a list of 6 numbers beginning at 0 within a Bash script? list 0-5 seq 0 1 5 echo 0-5 seq 0 1 6The seq command is used to print a sequence of numbers in a variety of formats. The answer for this question provides a starting point (0), and increment (1), and the final number (5), resulting in six numbers being displayed as output.
365102-5002When creating a shell script, which of the following commands is used to display the contents of variables? var_dump echo ls envThe echo command is used to display its argument, regardless of whether the command is used inside a shell script or from the command line itself. The env command is used to display environment variables and therefore does not meet the need specified in the question. The var_dump command is used within PHP, and ls is used to display contents of directories.
366102-5001A command has the following listing obtained with ls -la: -rwsr-xr-x 1 suehring suehring 21 Nov 2 13:53 script.sh What does the s denote within the user permissions in the listing? The suid bit has been set for this program. This is a symlink. The file will not be executable. The file is a special system file.The suid bit enables the program to run as the user who owns the file regardless of who executes the program. Using SUID is typically not recommended for security reasons.
367102-5004Which of the following commands will execute a script and then exit the shell? run source ./ execThe exec command executes the command given as its argument and will then exit the shell. The source command does not exit the shell.
368102-5003Which sequence of characters will execute two commands but only if the first command exits successfully? -- &* && &The double-ampersand sequence executes commands only if the previous command exited cleanly.
369102-5003Which command within a shell script awaits user input and places that input into a variable? exec get read promptThe read command awaits user input and places that input into the specified variable. The exec command is used to execute commands, and the other options are not valid for the purpose described.
370102-5001What characters are used to mark a sequence of commands as a function in a Bash script? Parentheses to declare the function (optional) and curly braces to contain the commands Curly braces to declare the function and parentheses to contain the commands Square brackets to declare the function and curly braces to contain the commands Runquotes to denote the functionParentheses are used to denote a function, such as myFunction(). The parentheses are optional but are then followed by curly braces containing the commands to be executed when the function is called.
371102-5003Which character sequences denote an alternate command to execute if the preceding command does not exit successfully? && -- || ELThe || sequence indicates an alternate command to run if the initial preceding command does not exit cleanly. The && sequence executes only when the preceding command exits cleanly, so its just the opposite of what the question was asking.
372102-5003Which keyword(s) is/are used to begin an alternate condition within a Bash script? if else if elif elsifThe elif keyword is used to create an alternative execution path within a shell script. The other constructs, such as else if and elsif, are used in other languages.
373102-5003Which of the following commands removes a currently defined aliased command? remove rm unalias deleteThe unalias command is used to remove a previously defined alias. The rm command will remove regular files but not aliases. The other commands do not exist.
374102-5004When sourcing a file in Bash, which chmod command would be necessary to provide the minimum privileges in order for the file to be sourced correctly, assuming that your current user owns the file? chmod 600 chmod 755 chmod 777 chmod 400At a minimum, you need to be able to read the file being sourced; therefore, chmod 400 will correctly set the permissions. Any chmod that gives additional permissions is not necessary.
375102-5003Assuming that a space-separated list of values has been defined as LIST="one two three four", which of the following for loop constructs will iterate through the elements in the list? for LIST for VAR in LIST for VAR in $LIST for $LIST -> $VARThe for loop construct in this case will require the variable name LIST to be preceded with a dollar sign ($),making option C correct. The other options will not work for the purpose described.
376102-5003Which test within a shell script while loop will examine one value to see if it is less than another? -less -lessThan -lt -lthanThe -lt operator is used to test for “less than” conditions within a script. The other operators are not valid for use in a shell script.
377102-5002Which of the following tests will determine if a file exists in the context of a shell script? -a -e -m -iThe -e test checks to ensure that a file exists and is typically used in the context of a conditional within a shell script. The other options may work within shell scripts but are not tests for file existence.
378102-5003Within which directory should you place files to have them automatically copied to a users home directory when the user is created? /etc/userhome /etc/templateuser /etc/skel /home/skelThe /etc/skel directory contains files to be copied to the users home directory. The other directories listed for this question do not exist by default.
379102-5003Which option to bash will cause the shell to be executed without reading the initialization files? --no-rc --no-init --norc --rc-noneThe --norc option causes bash to execute without reading the /etc/bash.bashrc file or the local ~/.bashrc file. The other options listed do not exist as options for bash.
380102-5001Which of the following creates an array in a Bash script? ARRAY=(val1 val2) ARRAY = "val1 val2"ARRAY_PUSH($ARRAY,"val1","val2")ARRAY{0} = "val1"Array creation in a shell script involves parentheses when used in this manner. You can also use square brackets to define individual elements, as in ARRAY[0] = "val1".
381102-5003Which option of declare displays output in a way that could then be used as input to another command? -o -n -p -mThe -p option to declare displays fully qualified shell statements such that the statements could then be used as input for another command, either through piping or redirection to a script.
382102-5001You need to create a function that will be available each time that you log in to the system. Within which file should this function be placed? .bash_profile .rc /etc/profile .bash_runThe .bash_profile file, if it exists in your home directory, will be executed on login. Note that placing the function in /etc/profile would technically work but then the function would be available to all users, which is not what the question asked for.
383102-5002Which shell built-in command is used to display a list of read-only variables? ro readonly env-ro ro-envThe readonly command displays the list of read-only variables that have been declared in the current session. The other commands listed for this question do not exist.
384102-5003Which characters are used to denote the beginning and end of the test portion of a while loop in a shell script? Parentheses ( ) Curly braces { } Square brackets [ ] Double-quotes Square brackets are used to denote the beginning and end of the test portion of a while loop in a shell script. Other languages generally use parentheses for this purpose.
385102-5002When using the test built-in with one argument, what will be returned if its argument is not null? false true unknown -1The test built-in will return true and can be used to test for the value existence of a variable not being null. Note that the behavior of the test built-in differs depending on the number of arguments.
386102-5003Which environment variable is used when changing directory with the tilde character, such as cd ? HOMEDIR HOMEPATH HOME MAILPATHThe HOME environment variable, set automatically to the users home directory, is consulted when the command cd ~ is entered. The other paths beginning with HOME do not exist by default, and the MAILPATH environment variable shown contains a list of locations where mail is checked when using the shell interactively.
387102-5002Which environment variable can be set if you want to automatically log users out of their shell after a certain period of inactivity? TIMEOUT TMOUT TO IDLETIMEThe TMOUT variable can be set in a given users shell and that user will be logged out after the value given (in seconds) of inactivity. The other environment variables listed here do not exist.
388102-5002When using a case statement within a shell script, which sequence denotes the ending of the case/switch statement? caseend esac endcase }Just as with an if statement where the statement is ended with fi, so too is a case statement ended with the word case spelled backward. The curly brace shown as option D is used to close case statements in many languages, but not for shell scripts.
389102-5001Which of the following commands will obtain the date in seconds since the epoch and place it into a variable called DATE within a shell script? DATE="$(date +%s)"DATE="date"DATE="$(date)”DATE="$date %s"The provided answer performs command substitution and places the value from the resulting command into a variable. Note the use of +%s formatting on the date, which then formats the output as seconds since the epoch, as specified in the question. Option C will provide the date within the DATE variable but will not format it as specified.
390102-5002Assume that you have a variable called $FILEPATH within a Bash shell script. Which characters can be used to ensure that the variable will be interpolated correctly regardless of where the variable appears within the script? Dollar sign: $FILEPATH Curly braces: ${FILEPATH} Parentheses: $(FILEPATH) Square brackets: $[FILEPATH]Wrapping a variable in curly braces, such as ${FILEPATH}, will ensure that the variable is interpolated or expanded correctly even when used in a place where it might not normally be expanded, such as within a quoted string.
391102-5002Which sequence is used to mark the beginning and end of the commands to execute within a for loop in a shell script? Curly braces: { } The keywords do and done Semicolons: ; TabsIn shell scripts, the commands to execute begin at the do keyword and end at the done keyword. Other languages generally use either curly braces or tabs.
392102-5004Which of the following tests will determine if a file exists and can be read by the user executing the test? -e -m -a -rThe -r test determines whether a given file exists and can be read by the current user. The -e test only checks to see if the file exists.
393102-5001Which option of the declare command will create a variable that is read-only? -r -ro -p -xThe -r option to declare will create or mark the variable as read-only. The -p option prints output in a format that can be reused. The -x option declares the variable for export.
394102-5004Which character sequence is used to provide a default case when used within a case statement in a shell script? default: Err:511--> *)The *) sequence is used to denote a default set of statements that will be executed if no other case matches within the set.
395102-5001Which character sequence can be used for command substitution in Bash? Backquotes: ` ` Single quotes: ' Double quotes: " Backslashes: \\Backquotes can be used for command substitution within a Bash script. The other options shown are not valid for command substitution.
396102-5002When using a while loop in Bash, which character sequence marks the end of the loop? elihw done end odThe character sequence done denotes the end of a while loop in Bash.
397102-5002Which operator is used to test if a value is greater than or equal to something in a Bash script? != >= Err:510>>Greater than or equal to is tested with >=. Of the other operators shown, != tests for inequality.
398102-5003You are working with a shell script called listusers and the script does not execute with the error "permission denied". What could be the possible cause of this issue? The script should have an .sh extension. The script contains a syntax error. The script does not have its execute permission set correctly. The script is named with lowercase letters.The execute bit is not set on the script, resulting in the permission denied error, making option C correct. The file extension does not matter, so option A is incorrect. Likewise, option B is not correct because the script isnt even executing. Lowercase or uppercase letters do not matter, making option D incorrect.
399102-5004Which option to the export built-in command makes names available as functions to child processes? -m -e -w -fThe -f option exports names as functions to child processes. The other options shown do not exist with the export command.
400102-5004If a variable has been created using the set command, which command can be used to remove the variable? remove del delete unsetThe unset command removes a variable from being set. The other options shown do not exist.
401102-5001Which of the following files is a systemwide initialization script for Bash? /etc/bash.bashrc /etc/bash.init /etc/bash.cfg /etc/bash/bash.initThe /etc/bash.bashrc file is a systemwide configuration file for the Bash environment. Another systemwide file used for similar purposes is /etc/profile.
402102-5004Which option to the set command enables debugging output? -d +d -x +xThe +x option enables debugging output and is frequently used when debugging shell scripts. The -x option is used to disable debugging. The -d and +d options do not exist.
403102-5004Which of the following files is executed with every interactive Bash shell invocation? /etc/bash.d /etc/bash.interactive /.bash_inter /.bashrcThe .bashrc file in a given users home directory is executed for interactive logins. The other files shown do not exist.
404102-5001Which keyword declares a block of code to be a function in a Bash script? function repeat func blockThe function keyword declares a block of code to be a function in Bash. Its worth noting that the function keyword can be omitted in most cases. The other options are not valid.
405102-5002Which of the following statements adds the /srv/bin path to the path for a Bash shell? PATH=/srv/bin PATH=$PATH:/srv/bin PATH = /srv/bin PATH=/srv/bin;$PATHThe syntax shown in option B is the correct syntax to add a path to the current environment. Option A does not include the existing path (and will, in fact, overwrite the existing path). Option C contains spaces, and option D uses a semicolon as a delimiter.
406102-5004Which variable is available to a Bash script and contains the name of the script itself? $SCR $SCRIPT $CMD $0The $0 variable is automatically defined and contains the name of the script itself. The other options shown do not exist by default.
407102-5001Which option to the seq command sets a delimiter of a space between the numbers 1 through 5? seq -s ' ' 1 5 seq -d ' ' 1 5 seq 1 5 seq -m 1 5The -s argument enables setting of a delimiter. When used, the numbers will be printed in a sequence rather than one per line. The -m and -d options do not exist.
408102-5004Which file test is used to determine if you are the owner of the file being tested? -m -k -w -OThe -O option is used to determine if the user currently running the test is the owner of the file being tested. The -k option checks to see if the sticky bit has been set. There is no -m file test.
409102-5001When testing a return value in a Bash script, which exit code indicates success? 012CA successful return from a command executed within a Bash script is 0. A 1 or higher typically indicates an error condition. There is no C condition.
410102-5001You have created a README file and placed it into /etc/skel so that users get the file in their home directories. The file is missing from some home directories on the system. Which of the following best explains this scenario? The file is not copied automatically for existing users. The file is too big for a users home directory. The file already exists. The file needs a file extension.The file is not copied to directories for existing users, making option A correct. There is nothing in the question to indicate that the file is too big or that it already exists. File extensions dont matter in Linux, so option D cannot be correct.
411102-5003You have a Bash script that uses the following find command: find . -name ".git" -type d When another administrator uses the script, it does not find all of the indicated directories. Which of the following is the best explanation for this scenario? The find command is tied to specific users. The find command cannot find directories beginning with a dot. The find command begins the search in the current directory. The find command cannot find directories.The find command begins the search in the current directory, which is problematic in a scripted scenario like the one presented. The find command can find directories, and those directories can begin with a dot character.
412102-5002You have specialized software that needs to be installed with an empty environment. Which option to the env command can be used to meet this requirement? -e i -f -cThe -i option ignores the environment. The other options are not valid for use with env.
413102-5001Which option enables debugging when used on the interpreter (#!) line within a Bash script? -x -d -a -fThe -x option enables debugging when passed on the interpreter line of a Bash script. The other options are not valid for this purpose.
414102-5003Which of the following will output the number 5 as part of a Bash script? echo 2+3 echo 2 + 3 echo $[2+3] echo ${2+3}Doing math in Bash requires a special syntax. The bc command can also be used for such operations and is frequently used for math within Bash scripts.
415102-5001You need to prompt the user to enter two values in a Bash script and capture them in variables VAL1 and VAL2. Which of the following commands can be used for this purpose? read VAL1 VAL2 prompt VAL1 VAL2 VAL1=$0 VAL2=$1 (VAL1 VAL2) = promptThe read command will be used, and option A shows the correct syntax. Option C is incorrect because it does not prompt the user. There is no prompt command, making options B and D incorrect.
416102-5004Which option to the export built-in command removes a variable from being exported? -m -o -r -nThe -n option removes a variable from being exported. The other options do not exist.
417102-5001Which of the following tests the return value from the previous command to see if the command was successful? if [ $? -eq 0 ]; if [ $? = 0 ]; if ($PREV == 0) { if [ $RETV === 0 ];The exit code from the previous command is captured automatically in the $? variable, thus ruling out any option that did not have this value. A test for the value is done with -eq in a Bash script, thus making option A correct.
418102-5004You have a file containing bash functions. Which command can be used to add these functions to the current environment? function include require sourceThe source command is frequently used for the purpose described. The function command can be used to create functions but would not be used for the purpose described. The include and require commands are not valid.
419102-5002Which chmod command grants the user execute permission on a script? chmod user += exec chmod u+x chmod 644 chmod u+allAdding the execute bit for the user can be done in a non-octal format, as shown in option B. The only other valid chmod option is 644, which does not grant execute permission.
420102-5002Which find command will locate all files named with an .sh extension? find / -name "*.sh"find / -name "*.sh" -type f find / -name "*.sh" -type d find ./ -name "*.sh" The problem statement specified files, making option B the best answer. Option A will also find directories.
421102-5003Which unset option can be used to remove a function from being defined? -r -a -f -gThe -f option removes a function. The other options do not exist for the unset command.
422102-5001When setting the shebang line of a shell script, which of the following commands will help to determine the location of the interpreter automatically? #!/usr/bin/env bash #!/bin/bash #!env /bin/int bashThe env command, when used as #!/usr/bin/env bash, will determine the location of the Bash interpreter automatically. This makes the resulting script more portable for systems where Bash may not be located in /bin/.
423102-5002Which mathematical operator is used for division within a Bash script? \ / * //The front slash, or forward slash, is used for division. Of the other options, an asterisk is used for multiplication and the other options are not valid.
424102-5002You need to send an email to the superuser if a command is successful. Which of the following commands will send mail from a Bash script? smtpsend mailx sendm mailsendThe mailx command can be used to send mail from the command line. The other options shown are not valid commands.
425102-5004Which file test operator is used to determine if the file is not zero size? -d -e -f -sThe -s operator tests if a file is not zero size. The -d operator looks for directories, whereas -e merely checks if the file exists.
426102-5001You have created an alias but it is gone the next time you log in. Which of the following best explains this scenario? The alias was not placed into an initialization script. The alias was invalid. The command is not valid for which the alias was created. The alias created an invalid symlink.An alias exists only for the length of the current session, making option A correct. If the alias or command was invalid, you would have seen it immediately when you created or used the alias.
427102-5004Which of the following is valid syntax to create a variable named FILENAME in a Bash script and set it equal to the second command-line argument? $FILENAME = $2 FILENAME=1 FILENAME = $(2) FILENAME=$2The correct syntax is shown in option D for the scenario described.
428102-5002You are working with a user who is reporting that their environment does not have certain variables defined, but other users do have those same variables available within their environment on login. The issue was not corrected by having the user log out and then log in again, and you can see their successful login. What is the most likely explanation for this issue? The user has logged in from the console. The user is using a different shell. The user has removed the environment variables manually. The user is logging in to a different system.The user is most likely not using Bash but is rather using another shell like Tcsh. The user could be logging into a different system, but hopefully by having them log out and log in again that would have been noticed, as would their manual removal of the environment variables.
429102-5001Which environment variable contains the username of the currently logged-in user? LOGNAME LOGIN LOGGEDIN LOGINUSERThe LOGNAME environment variable contains the currently logged-in user. The other variables do not exist by default.
430102-5001Which file test operator is used to determine if the file is a symbolic link? -h -p -S -tThe -h test determines if the file is a symbolic link. The -p option tests if the file is a pipe, and -S returns true if the file is a socket. The -t test determines if the file is a terminal.
431102-5003Which option to the readonly command marks a function as being read-only? -a -r -f -pThe -f option marks a function as read-only. The -p option prints a list of read-only identifiers. The -a option assumes that the name is an array, and there is no -r option to the readonly command.
432102-5002Which find command will locate all files where the users have the execute bit set? find ./ -type f -perm 700 find / -type f -perm -u+x find / -type f -perm 777 find / -type f -perm -execuserOption B is the best answer because it will find files where the user permission includes the execute bit. Its worth noting that options A and C will find the execute bit but only with the exact permissions specified.
433102-5001According to the FHS, which of the following directories is used for local binaries? /usr/local/bin /usr/bin /usr/sbin /home/scriptsThe /usr/local/bin directory is the location specified for local binaries according to the FHS. Its also a typical place for scripts as well. The /usr/bin and /usr/sbin directories are for system binaries, and /home/scripts does not exist by default.
434102-5004Which key sequence can be used to terminate a Bash script? Ctrl+d Ctrl+l Ctrl+a Ctrl+cCtrl+c is used to terminate a script and is usually used for terminating programs as well.
435102-5002You need to view the current environment variables in a single line rather than with newlines separating each variable. Which option to the env command can be used for this purpose? -n 0-c -eThe -0 option follows each environment variable with a null byte rather than a newline. The other options shown are not valid for use with env.
436102-5004You are attempting to copy several files, but the cp command keeps asking for confirmation before overwriting. Which of the following best describes the most likely cause? The cp command has been compiled to ask for confirmation. The cp command always prompts for confirmation. The cp command cannot be used for the purpose described. The cp command has been aliased to include the -i option.In all likelihood, the cp command has been aliased with the -i option. Running unalias cp will correct the issue. It is possible that the cp command has been recompiled to always ask for confirmation, but this is not the most likely cause.
437102-5003You receive an exit code of 1 when working with the grep command in a Bash script. What does exit code 1 mean with grep? Error Success Search pattern not found Search pattern foundAn exit code of 1 usually means error, but in the case of grep it means that the search pattern was not found.
438102-5002Which of the file test operators is used to determine if a file is a directory? -e -d -w -aThe -d test checks if a file is a directory. The -e option checks for existence, and the -a option is no longer used. The -w test checks to see if a file is writable by the current user.
439102-5002Which of the following statements prepends the /usr/local/bin path to the path for a Bash shell? $PATH=/usr/local/bin:$PATH PATH=/usr/local/bin:$PATH PATH=$PATH:/usr/local/bin PATH=$PATH;/usr/local/binThe command shown prepends /usr/local/bin on to the existing path. Option A uses $PATH, which is the incorrect identifier for the left side of the assignment. Option C appends /usr/local/bin rather than prepends, and option D uses a semicolon as a delimiter.
440102-5003Which looping construct is executed at least once in a Bash script? while for until caseThe until loop construct will execute at least once before the condition is evaluated. The while and for loops both evaluate the condition first. The case statement is not a loop construct.
441102-5002Which character or character sequence is equivalent to the source built-in in Bash? <> . -> %The single dot, ., can be used as a means to source environment variables. The other characters and character sequences do not work for the purpose described.
442102-5001Which option to the export built-in command displays the list of exported variables? -p -a -t -dThe -p option displays all exported variables. The other options shown do not exist.
443102-5004Which character or character sequence denotes the beginning of a while loop in a Bash script? start { >> doThe word do indicates the beginning of a while loop in a Bash script. The other options shown are not valid for the purpose described.
444102-5001Within which configuration file is the greeter configured for LightDM? /etc/lightdm/lightdm.conf /etc/lightdm/greeter.conf /etc/lightdm.conf /var/lib/lightdm/lightdm.confThe greeter is configured through /etc/lightdm/lightdm.conf using the greeter-session option. The other options provided here are not valid.
445102-5002Which section in /etc/X11/xorg.conf is used to describe configurations for a given graphics card and monitor pair? Server Screen VidMode VideoThe Screen section of xorg.conf is used to logically bind a given graphics card and monitor, each of which would be defined in its own respective section in the configuration file. The other options shown for this question do not exist.
446102-5001When youre setting the frequency options for a given monitor, which of the following is not an available frequency unit? uHz MHz kHz MFrequency options are Hz, k, kHz, M, or MHz, making uHz an unavailable option.
447102-5003Which command on a systemd-based system is used to disable booting into a GUI? systemctl gui-boot disable systemctl set-default boot-gui false systemctl set-default multi-user.target systemctl set-default-multi falseThe systemctl set-default command will be used for this purpose, and the target of multi-user is used to boot to the command line. You will also need to remove the word splash from /etc/default/grub and run update-grub as well.
448102-5001Assuming X forwarding has been enabled on the SSH server, which environment variable is used to set the location for newly spawned windows from within an SSH session? DISPLAY XTERMINAL XTERM XDISPThe DISPLAY variable can be used to remotely send the windows of an X session to another computer when using protocols like SSH. There is no XTERMINAL or XDISP environment variable, and XTERM is typically a terminal window and not an environment variable.
449102-5004Within the greeter section of a display manager such as GNOME Display Manager (GDM), which option sets the welcome message for users logging in locally? LoginMessage Login WinGreet WelcomeThe Welcome option sets the message to be displayed to users within the display manager when they log in. For remote users, the RemoteWelcome message can be used for the same purpose.
450102-5003Within GNOME, enabling sticky keys can be done by pressing which key five times in a row? Ctrl Enter Shift TabThe Shift key can be used to enable and disable sticky keys within GNOME and other operating systems for accessibility purposes.
451102-5001Which option in the Module section of the xorg.conf configuration file causes a default module to be unloaded or not loaded by default? Disable Unload LoadDisable DisableLoadThe Disable keyword is used to ensure that a given module is not loaded. Note that a Load statement for the same module takes precedence over the Disable statement, but Disable can be used to unload modules that are loaded by default.
452102-5001Which program is used in a GNOME environment as a screen reader? Orca Screed Screen ReaderThe Orca project provides assistive screen reading capabilities within GNOME. Of the other options given, the screen program is valid but is not used for this purpose.
453102-5003Assuming a monitor that is currently set at 1024×768, which command will change the screen resolution so that icons and other elements appear larger? xterm -r 0 xset res 1024x768 xrandr -s 800x600 xVGAThe xrandr command can be used to change resolution, and changing the resolution to something like 800×600 would make icons and other items appear larger.
454102-5004LightDM typically allows guest login by default. Which configuration option within SeatDefaults changes this to disallow guests? guest-login=false guest=false allowg=false allow-guest=falseThe allow-guest option changes the behavior of guest login for LightDM, and disallowing guest login would generally make the computer somewhat more secure. However, if someone has physical access to the device, they might be able to get access in other ways.
455102-5003When using XFree86 as the X server, which command will cause the X server to query for hardware and create a new configuration file? XFree86 --newconfig XFree86 --query XFree96 -configure xf -configThe XFree86 -configure command tells the XFree86 server to query for hardware and create a configuration for the recognized hardware. Note that you may still need to edit the resulting configuration file because of unrecognized hardware or to account for specific configuration items.
456102-5002Which configuration option for X is used to configure the keyboard model? XkbLayout XkbModel XkbType XkbInputThe XkbModel configuration option is used to set the type of keyboard being used, such as pc105 for a 105-key keyboard. The XkbLayout option defines the layout of the keyboard such as US for United Statesstyle keyboards.
457102-5002Which configuration line with a Monitor section of an X server configuration file will set the vertical refresh rate between 55 and 75 hertz? Vert 55-75 VertRefresh 55.0 - 75.0 VertSync 55.0 - 75.0 RefreshMode 55.0 - 75.0The VertRefresh option is used for this purpose and accepts a range of values in the manner shown. The other options given for this question are not valid for the purpose described.
458102-5004Within which file can a user place commands for executing X clients? /.xclients /.xsess.rc /.xsessrc /.xsessionThe file ~/.xsession can be used for commands that run X clients. The other files are not valid for the purpose described.
459102-5003Which AccelerationProfile for an input device such as a mouse enables linear acceleration (more speed and more acceleration)? 01 67The linear acceleration profile is enabled by setting AccelerationProfile to 6 within xorg.conf. The 0 setting is known as classic, whereas -1 provides constant acceleration (no profile) and 7 is known as limited, which performs the same as linear but with a maximum amount of speed and acceleration.
460102-5001Which of the following directories is used by an Xorg-based server for storage of fonts? /usr/share/fonts /usr/X11/fonts /etc/fonts /var/font/xorgThe /usr/share/fonts hierarchy is used for storage of fonts. Another path that might contain font information is /usr/share/X11/fonts, but that was not among the choices given for this question.
461102-5003Native support for a Braille display requires a minimum of which kernel version? 2.2.0 2.4.22 2.6.26 3.2.1Kernel versions beginning with 2.6.26 include native support for Braille displays in Linux.
462102-5001Which configuration option in an xorg.conf file can be set to prevent a user from changing video modes using the Ctrl+Alt+Keypad-Plus and Ctrl+Alt+Keypad-Minus? DontZoom Modes=No NoModeSwitch DontZapThe DontZoom option prevents the specified key combinations from changing the video mode. Of the other options, the DontZap option changes the behavior of the Ctrl+Alt+Backspace key combination. The other options dont have any effect and are not valid in xorg.conf.
463102-5003In which location does the xauth utility look for the X authority file? /.Xauth /.xauth.cfg /.Xauthority /.xauThe xauth program looks for the configuration file in the users home directory in the file .Xauthority. The other files do not exist by default.
464102-5003Access to hosts controlled with XDMCP is configured in which file? xdmcp.access.conf XDMCPAccess.cfg Xaccess XDaccess.confThe Xaccess file is used to control access when using XDMCP. The other files are not valid for this purpose.
465102-5004When using KDE, which program provides magnification functionality? xmag mag pmag kmagThe kmag program magnifies items on a desktop and is used as an assistive technology. In general, kmag can be used with other window managers as well.
466102-5001Which signal is used by an X server to cause a clean exit? SIGTERM SIGKILL SIGCLEAN SIGEXThe SIGTERM signal causes the X server to exit cleanly. SIGKILL would not be a clean exit. The other signals shown as options are not valid signals.
467102-5002Within GNOME, which section of GNOME Control Center is used to choose a high-contrast theme? Display Appearance Locale ContrastThe Appearance section of GNOME Control Center is used to set many aspects of how the desktop appears and behaves, including the choice of a high-contrast theme.
468102-5002Which of the following best describes the concept of a mouse gesture? A mouse gesture enables special clicks, such as a right-click context menu. A mouse gesture facilitates the use of programs by moving the mouse in a certain way.A mouse gesture is used for login purposes. A mouse gesture is used to capture screenshots.Mouse gestures are commonly associated with assistive technologies and help to facilitate uses of programs by moving the mouse in a certain way. Mouse gestures could be used for login and to capture screenshots, but those are not adequately or generally descriptive of their use.
469102-5004In GNOME 3.9 or later, which keyboard shortcut activates the screen reader? Super+R Super+S Ctrl+Super+S Alt+Super+SThe Alt+Super+S keyboard shortcut activates the screen reader in GNOME 3.9 or later. The Super+S shortcut enters Overview, and the other shortcuts provided do not have a special meaning by default. Note that the Super key is also called the Windows key or the Command key.
470102-5004Assume that the display manager has been disabled on boot. Which command can be used after login to start the X server? xs xstart X -start startxThe startx command kicks off the display manager after login to a local terminal. The other commands shown do not exist or will not work for the purpose described.
471102-5002Which option in an xorg.conf file configures the amount of time before the screen goes into blank mode but does not go into standby and is available on non-Display Power Management Signaling (DPMS)-capable monitors? StandbyTime BlankTime SuspendTime OffTimeThe BlankTime option, which is set to 10 minutes by default, causes the monitor to go blank but not actually go into standby or other power-saving modes.
472102-5003Which of the following commands helps you to determine information about a given window within an X session, including information on the window size and its position? xkbinfo xdspy xwininfo xverThe xwininfo command displays information about a given window within an X session. The other commands listed for this question are not valid.
473102-5001Which option/button on the GNOME On-Screen Keyboard (GOK) is used show the keys that would be used in place of a mouse? Mouse MouseKeys Movement ComposeThe Mouse button displays keys to move the mouse. The Compose button shows a compose keyboard, and the other options are not valid.
474102-5003Which of the following commands allows a host named cwa to connect to the X server? xconnect cwa xterm +cwa xhost +cwa xf cwaThe xhost command is used to control access to the X server. A host is added with the + sign.
475102-5002Which of the following options in the client SSH configuration file needs to be enabled so that X sessions can be sent over an SSH connection? X11Connect yes ForwardX11 yes ForwardX yes XForward yesThe ForwardX11 option must be enabled on the client in order for X connections or windows generated from the X server to be sent over an SSH connection.
476102-5004Which configuration option in a Files section of an xorg.conf configuration file can be used to add a path in which the server will search for fonts? FontSection Fonts FontLoc FontPathThe FontPath directive provides another location in which the server can find fonts. The other options do not exist within the context of an xorg.conf configuration file.
477102-5004Which assistive technology is used to provide an input method for users who cannot type but can use a pointer, such as a mouse? Keyboard Sticky keys Mouse keys On-screen keyboardWith an on-screen keyboard, users can utilize a pointer such as a mouse to select keys on the keyboard.
478102-5003Which environment variable can be used to specify the location of a users xauth authority file? XAUTH USERXAUTH XAUTHORITY xauthlocThe XAUTHORITY environment variable can be used to specify the location of the xauth authority file.
479102-5002When using LightDM, which key combination is used to revert back to a terminal? Alt+Ctrl+F2 Alt+Ctrl+F1 Ctrl+F1 Ctrl+EscThe Alt+Ctrl+F1 key combination is used to get to a terminal prompt and is helpful in situations where the X server wont start properly.
480102-5002Which option in the LightDM configuration enables automatic login for a specific user? auto-login autologin-user autologin auto-login-userThe autologin-user option is used to define a user who will be automatically logged in to the system. The other options given in this question do not exist.
481102-5003Which of the following is a legacy utility that can be used to set accessibility options on older systems? Xaccessibility Xas AccessX setXThe AccessX utility is used on legacy or older systems to set many of the accessibility options. The functionality provided by AccessX can typically be found in one of the utilities provided by the native X window manager, dependent on the window manager in use.
482102-5001Which command, when executed on a remote host, will send the display of X programs to the local client? (Assume Bash is used as the shell.) export DISPLAY env DISPLAY setx HOST export XHOSTThe export shell command sets an environment variable. In this case, the DISPLAY environment variable needs to be set. The env command shown will not set the variable.
483102-5001Which option in GOK is used to display the keys that correspond to a given applications menu? Menus Activate MenuKeys KeysThe Menus option displays the menu options for a given application so that those options can be manipulated with the keyboard. The Activate option helps to work with the desktop and other applications. The other options shown for this question are not valid.
484102-5002Which directory is used to store individual configuration files related to LightDM? /etc/light /etc/lightdm/lightdm.conf.d /usr/lightdm /etc/lightdm.confThe /etc/lightdm/lightdm.conf.d directory contains individual *.conf configuration files for various settings and is typically parsed along with the /etc/lightdm/lightdm.conf file.
485102-5002Which environment variable is used by Xsession to specify the width of a terminal device? TERMCHAR COLUMNS CHARACTERWIDTH TERMCOLThe COLUMNS environment variable specifies the width in characters of a terminal device. The other environment variables are not valid.
486102-5003Which option within the Device section for a video card will set the amount of RAM available on the card? VRAM RAM VideoRam vRamThe VideoRam option, which can be expressed in bytes, configures the amount of RAM available to the video card.
487102-5002When configuring a Screen section in an X configuration file, the Display subsection can contain the color depth. What is the name of the option to set the color depth of the given display? ColorDepth Depth CDepth colorDepThe Depth option sets the color depth for a given monitor display. A typical value might be 24 for this option.
488102-5002Multiple server layouts may be created within an X configuration file. Which option is used to differentiate between the different server layout options? ID Identifier LayoutName LayoutThe Identifier option provides a unique description of each of the server layouts in an X configuration. The other options shown for this question do not exist.
489102-5001Which command can be used to create a fonts.scale file definition when executed against the current directory? mkfontsscale mk.fonts mkfontfile fontmkThe mkfontscale command will create a fonts.scale file, which describes the outline fonts on the system and is used for configuration of fonts that are manually added to the system.
490102-5001What abbreviation used in X signifies a display that utilizes additional capabilities such as extended power-saving capabilities? DPMS XPMS DISPPWR PWRDDisplay Power Management Signaling (DPMS) enables additional power-saving modes, such as a full sleep mode, that enable further energy efficiency for the display.
491102-5002What is the name of the accessibility function that provides an alternative to the Orca program to assist users who have visual impairments? Viz emacspeak Ahleah vAssistThe emacspeak program provides another visual assistive technology as an alternative to Orca. The other technologies listed here are not related to visualization or assistive technologies.
492102-5002Which of the following is a reference implementation of the Wayland protocol? Wlnd Weston Wausau WittenbergWeston is a reference implementation of the Wayland protocol.
493102-5003Within an xorg configuration file, which option sets the inactivity timeout for the suspend mode of a DPMS-capable monitor? InactTimeout InactivityTime SuspendTime InTmoutThe SuspendTime sets the time, in minutes, for the monitor to go into standby mode. The other options shown are not valid.
494102-5003When the X server is started as a normal user, configuration files from which directory are also included? /etc/X /etc/X11/UserConfig /etc/X11/xorg.conf.d /etc/X/UserConf.d/The files in /etc/X11/xorg.conf.d/ are included when X is starting.
495102-5002Which of the following remote desktop protocols uses no compression or transport/session encryption? SSH XDMCP XR RDXDMCP, which is typically disabled by default, uses no compression or transport security. XDMCP is therefore not usually preferred for remote access. Of the other options, SSH offers encryption of the session, and XR and RD are not valid protocols.
496102-5004Within which desktop implementation would you find the xfwm4 window manager? XWin KDXF Exf XfceThe Xfce desktop environment uses xfwm4 as its window manager. The other options are not desktop environments.
497102-5002Which option to Spice startup disables simple authentication? disable-auth disable-ticketing disable-authentication disable-simpleauthThe disable-ticketing option turns off simple authentication for clients with Spice.
498102-5002Which speech recognition software is included with the KDE desktop environment? Alvin Simon Theodore ZeppoSimon is the speech recognition software that is part of the KDE project.
499102-5004Within the GNOME 3 desktop environment, within which Settings panel are the options for slow keys found? Access Typing Settings Keyboard Universal AccessThe only valid panel listed in the options for this question is called Universal Access, making option D correct.
500102-5001When an X session is already running, which command can be used to enable pointer keys? setxkbmap ptrkeys pointerkeys keypad -ptrkeysThe setxkbmap command can be used to enable Xkboptions when X is already running. The other commands shown do not exist.
501102-5002Which of the following provides a server-side implementation of Remote Desktop (RDP) for Linux? lrdp xrdp rdp-linux lindpThe xrdp program is an open source implementation of an RDP server. The other programs shown are not valid.
502102-5001You are attempting to edit the sudoers file with visudo over an SSH connection on a system that has GNOME installed and you receive an error indicating that gedit cannot run. Which of the following commands can be used to solve this issue? export VISUAL="/bin/vim" ;"export DISPLAY subst DISPLAY=local env VISUAL=sshChanging the VISUAL environment variable to an editor that can run over an SSH session will fix the issue. In this case, /bin/vim was used.
503102-5002Which option to x11vnc sets the password to be used for clients connecting to the server? -password -passwd -pass -authThe -passwd option is used to set the password on the server for x11vnc.
504102-5004Which program is used to add entries to the X authority file? xf xauthen authx xauthThe xauth utility is used for working with the X authority file. The other options shown are not valid.
505102-5003Which assistive technology will ignore keys that are pressed in succession or held down? Sticky keys Mouse keys Bounce keys On-screen keyboardBounce keys cause the interface to not react when keys are accidentally pressed in succession or held down.
506102-5002Which environment variable is used by Xsession if the Xsession error file cannot be opened in its default location? XLOG TMPDIR SESSLOG LOGTMPThe TMPDIR environment variable is used if the normal home directory location, ~/.xsession-errors, cannot be opened. The other environment variables are not valid.
507102-5004From within an X session, which of the following commands shows information about the display, including resolution and color depth? xinfo xterm xwin xdpyinfoThe xdpyinfo command displays various elements about the current display(s) along with information about X itself.
508102-5002Which of the following files is the configuration file for Weston? /.config/weston.cfg /.config/weston.ini /weston.cfg /.westoncfgThe Weston configuration file is called weston.ini and is located in ~/.config. The other files are not valid.
509102-5001Which of the following remote desktop programs offers transport layer security? x11vnc xrd tls x11rtmThe x11vnc program, an implementation of VNC, offers built-in SSL/TLS capabilities. The other programs shown are not valid.
510102-5002Which add-on to Orca enables braille display support? brl brltty brldis dispbrlThe brltty program enables a text-mode braille display. The other programs are not valid.
511102-5002Which of the following is a screen magnifier program? xmag xzoom xzmag scrmagThe xzoom program is used for screen magnification. The other programs shown are not valid.
512102-5004Which GRUB variable can be used to beep when the GRUB prompt is ready to accept input? GRUB_BEEP BEEP_START GRUB_START_TONE GRUB_INIT_TUNEThe GRUB_INIT_TUNE variable can be used within the GRUB configuration in order to beep when GRUB is ready for input.
513102-5002You need to remove a host from being able to connect to the X server. Which of the following will remove a host named cwa from being able to connect? xrem cwa xhost -cwa xhost -rem:cwa xrem -host cwaThe xhost command will be used for this purpose, and the minus sign removes a host from being able to connect.
514102-5002The X Display Manager, xdm, runs various scripts as part of the login process. Which of the following scripts is executed as the user logging in? Xstart Xsession Xstartup Xuser.confThe Xsession script is executed as the user logging in, making option B correct. The Xstartup script is executed as root prior to the execution of Xsession. The other files are not valid as part of the xdm login process.
515102-5001Which option to the X server disables listening for TCP connections? -nolisten tcp -notcp -noconn tcp -noconnect tcpThe -nolisten tcp option disables listening for TCP connections for an X server. The other options are not valid.
516102-5002Which signal is used to close existing connections, free resources, and restore defaults for an X server? SIGKILL SIGHUP SIGN4 SIGALLSIGHUP is used for the purpose described, typically when a user logs out. SIGKILL does not restart the server or prepare for a new connection. The other signal names given as options are not valid signals.
517102-5003Which option in the SeatDefaults section of the lightdm.conf configuration file is used to disable the display of usernames for login? greeter-disable-user greeter-enable-login greeter-show-manual-login greeter-disable-auto-loginThe greeter-show-manual-login option, when set to true, will require the user to enter a username for login rather than select the username from a list.
518102-5002Which option to the xauth program disables hostname resolution? -r -n -h -mThe -n option disables hostname lookups. The other options shown are not valid.
519102-5003Which command will switch the system into an init in which the X server is not typically executed? telinit 6 telinit 1 telinit 3 telinit 5In runlevel 3, accessed through the telinit command, the X server is not typically executed. Runlevel 6 will shut down the system. Runlevel 1 switches to single-user mode, and runlevel 5 is a multi-user mode in which X is usually running.
520102-5003What is the default location for the error log if the X server is run with xdm? /etc/X11.log /var/log/Xdm.log /usr/lib/X11/xdm/xdm-errors /var/log/xdmerrorsAccording to the X server documentation at https://www.x.org/releases/X11R7.7/doc/man/man1/Xserver.1.xhtml, the default location is within the /usr/lib path, but its worth noting that Linux distributions may change this location to be within the /var/log/ hierarchy.
521102-5002Which script can be used for per-user initialization of xinit? /.xinit.conf /.xinitrc /.xinit.rc /.xinit.cfgThe ~/.xinitrc file can be used for per-user initialization. The other files are not used by default for this purpose.
522102-5003Which option prevents abstract sockets from listening with X11? -nolisten sock -nolisten absock -nolisten local -nolisten socklocalThe -nolisten local option can be added to prevent the X server from listening on abstract sockets.
523102-5004Which option to XDMCP enables sending of BroadcastQuery packets? -bcast -bcastQ -broadcastQuery -broadcastThe -broadcast option for XDMCP enables sending of BroadcastQuery packets. The other options shown are not valid options with XDMCP.
524102-5003When using GDM as the display manager, which GUI program can be used to set options for the login window? gdmlogin gdmconfig gdmsetup gdmThe gdmsetup program is used to configure various options for the login window and environment, including those for local and remote users. The other options are not used for this purpose or do not exist.
525102-5003Within the XDMCP access configuration file, there is a line like the following: *.example.com Which of the following describes how access will be treated for hosts from example.com? Only the host named *.example.com can connect. No hosts from example.com can connect. Any host within example.com can connect. Hosts that begin with * within example.com can connect.Any host within the example.com domain can connect.
526102-5003When using xhost, what is the syntax to enable a host named san to connect using IPv6? xhost +ipv6:san xhost -enablev6 san xhost +inet6:san xhost +enablev6 sanThe family inet6 enables the specified host to connect with IPv6. The other methods shown will not work.
527102-5002Within which file are errors for Xsession and X client processes placed? /.xsession-error.log /.xsession-errors /.xclient.log /.xclient.errorlogThe ~/.xsession-errors file is the default log file for Xsession and X clients. The other files are not valid for this purpose.
528102-5001GNOME includes native on-screen keyboard functionality. Which of the following commands starts the on-screen keyboard? gok osk kb oskbThe gok command, short for GNOME On-screen Keyboard, is the program to start the on-screen keyboard. The Caribou program will be the successor to GOK.
529102-5002Which option to the xauth program specifies the authority file to use? -a -f -a -vThe -f option enables file specification for the X authority file. The -v option enables verbose output. The other options are not valid.
530102-5002Which accessibility option is helpful if several keys are sometimes pressed or if there is difficulty in consistently pressing the correct key on the keyboard? Key toggle Slow keys KeyAssist UniversalKeysSlow keys is the name used to describe this assistive technology.
531102-5003On which port does RDP listen by default? 389808033893306RDP listens on port 3389 by default. Port 389 is LDAP, and 3306 is usually MySQL.
532102-5001You need to enable the web server (running as the www-data user and group) to write into a directory called /home/webfiles. Which commands will accomplish this task in the most secure manner? chgrp www-data /home/webfiles ; chmod 775 /home/webfiles chmod 777 /home/webfiles chgrp www-data /home/webfiles ; chmod 711 /home/webfiles chmod 707 /home/webfilesThe best option among these choices is to change the group to www-data and change the permissions such that the group can write into the directory. Option B should never be used because it enables world-writing to the directory. The other options will not allow the web server group to write into the directory.
533102-5002Which of the following will execute a job through cron at 12:15 a.m. and 12:15 p.m. every day? 0,12 15 * * * 15 0,12 * * * 15 * * * 0/12 */12 * * * 15The format for cron is [minute hour day-of-month month-of-year day-of-week], thereby making option B the correct option for this question.
534102-5003Which file is used to indicate the local time zone on a Linux server? /etc/timez /etc/timezoneconfig /etc/localtime /etc/localtzThe /etc/localtime file, which can be an actual file or a symbolic link, is used to indicate the local time zone. The other files listed as options do not exist.
535102-5004When importing entries into the LDAP database using ldapadd -f <filename>, in which format should the file be? LDAP TXT CSV LDIFThe LDAP Data Interchange Format (LDIF) is an open format, defined in Request for Comments (RFC) 2849, that enables import and export of LDAP entries. The file formats TXT and CSV are valid but not for the purpose described; there is no specific file format known as LDAP.
536102-5002Which of the following commands removes an expiration from an account? sudo chage -l username sudo chage -E -1 username sudo chage -E now username sudo chage --noexpire usernameThe chage command will be used for this purpose, specifically with the -E option. When provided with a date, chage will expire the account on that date. When provided with -1, the expiration will be removed.
537102-5004Within which directory will you find files related to the time zone for various regions? /etc/timezoneinfo /etc/zoneinfo /var/zoneinfo /usr/share/zoneinfoWithin the /usr/share/zoneinfo hierarchy, you will find information on the various regions and time zones available. The files within this hierarchy can be symlinked to /etc/localtime. The file /etc/timezone is also sometimes used by Linux systems and, notably, by Java in certain situations.
538102-5002Which of the following commands schedules a series of commands to execute 1 hour from now? atq +1hr at now + 1 hour atq at -1The at command is used to run a series of commands that you enter. Unlike with cron, you can schedule commands from the command line to be executed in the same order entered rather than having to create a specific script for the commands. The syntax shown in option B sets the time to be one hour from now.
539102-5002You need to delete a user from the system, including their home directory. Which of the following commands accomplishes this task? userdel userdel -r userdel -R deluserThe userdel command is used for this purpose, and the -r option (lowercase) deletes both the home directory and mail spool files. The -R (uppercase) option tells the userdel command to use a chroot directory.
540102-5002Which file contains a list of usernames, UIDs, and encrypted passwords? /etc/passwd /etc/shadow /etc/encpass /etc/grouppassThe /etc/shadow file contains usernames, UIDs, and encrypted passwords and is not readable by any non-root user on the system due to the sensitive nature of the encrypted passwords. The /etc/passwd file contains usernames and UIDs but not encrypted passwords. The other two files listed for this question do not exist.
541102-5003Which job scheduler should you use if the computer on which you need to schedule the job is powered down at various times? cron.d cron.hourly anacron atUse anacron when you need to schedule a job on a computer that might be off when the job is scheduled. anacron will take care of running the job at its next available time.
542102-5002Which of the following commands provides the current date and time in a format of seconds since the epoch? date +%seconds date +%s date --seconds date --nowThe +%s option will format the date as seconds since January 1, 1970. This option is used frequently in scripting and elsewhere for obtaining a unique time stamp that can be parsed easily as an integer. The other options will not work.
543102-5003Which option to the iconv command shows the available character sets on a given system? --showchar --show --list --allThe --list option shows the available character sets on the system. The other options given for this question do not exist.
544102-5003Which environment variable controls the format of dates and times, such as a 12-hour or 24-hour formatted clock? LOCALE_DATE DATE_FORMAT LC_TIME LC_DATEThe LC_TIME environment variable is used to control the display and behavior of the date and time and can be changed to a different locale in order to achieve the desired display and behavior of date and time formatting. The other options shown for this question do not exist.
545102-5004Which command is recommended for configuration of slapd for OpenLDAP versions 2.3 and later? slapd-conf config-slapd openldap-config slapd-configBeginning with OpenLDAP version 2.3, slapd-config is used for configuration of OpenLDAP, as documented at http://www.openldap.org/doc/admin24/slapdconf2.html. The other commands are not valid.
546102-5001Which shortcut within cron enables running of a task every day at midnight? @daily @daybegin @topday @begindayThe @daily shortcut schedules a job to run at midnight every day. The other options shown do not exist.
547102-5002Which of the following encoding provides a multibyte representation of characters? ISO-8859 UTF-8 ISO-L UFTMultiUTF-8 provides multibyte character encoding and is generally accepted as the standard for encoding moving forward. ISO-8859 is single byte encoded. The other options are not valid.
548102-5001Which of the following commands changes a group called DomainAdmins to DomainUsers? groupmod -n DomainAdmins DomainUsers groupchg DomainAdmins DomainUsers chgroup DomainAdmins DomainUsers group -N DomainAdmins DomainUsersThe groupmod command will be used for this purpose, and the -n option is used to change the group name. The other commands listed do not exist.
549102-5004Which file stores group information on a Linux server? /etc/groupinfo /etc/groups /etc/roles /etc/groupThe /etc/group file contains information on groups on a Linux system. The other files are not valid for the purpose described.
550102-5003Which command can be used to create an LDIF file from the current LDAP database? slapdump ldapdump slapcat catldapThe slapcat command dumps the slapd database in LDIF format to STDOUT. The output can then be redirected into a file. The other commands are not valid.
551102-5003You are looking for a scheduled job that is not found in /etc/crontab, through systemd timers, or within /var/spool/cron. What is another location in which the scheduled job might be stored? /etc/crontabs /etc/cron.conf /etc/cron.d/ /etc/skedThe /etc/cron.d/ directory can contain scripts that have scheduling information within them along with jobs to run. The other locations given as options are not valid.
552102-5002You need to determine if LDAP integration is working correctly. In order to do so, you would like to obtain a list of users, as read by /etc/nsswitch.conf. Which command can be used for this purpose? getuser getent usermod userlistThe getent command is used to display entries based on the /etc/nsswitch.conf file. One use case for getent is when integrating with Microsoft Active Directory or another LDAP service to check if the connection can be made to the LDAP server. The usermod command is valid but is not used for this purpose, and the other commands shown for this question are not valid.
553102-5002What is the name of the configuration file that contains information about group and user addition, such as the maximum and minimum user and group IDs, to be used when adding users and groups? /etc/groupinfo /etc/login.defs /etc/login.info /etc/loginlistThe /etc/login.defs file contains various configuration items such as the minimum and maximum user and group IDs to be used on the system.
554102-5003Which environment variable is used for localization related to measurement units such as metric? LC_METRIC LC_MEASURE LC_MEASUREMENT LC_MEASUREUNITSThe LC_MEASUREMENT environment variable is used to indicate the measurement units that should be used.
555102-5004Which of the following lines added to .profile in a users home directory will set their time zone to Central time? TZ=/Central ; export TZ TIMEZONE='America/Chicago' ; export TIMEZONE set TZ=/Central TZ='America/Chicago'; export TZThe TZ environment variable is used for this purpose and the general format is as shown, making option D the correct answer.
556102-5001Within which directory will you find scripts that are scheduled to run through cron every 24 hours? /etc/cron.daily /etc/cron.weekly /etc/cron.hourly24 /etc/crontabThe /etc/cron.daily directory contains files such as scripts that are executed daily. There are corresponding cron.hourly, cron.weekly, and cron.monthly directories that run on their respective schedules, as indicated by the name of the directory.
557102-5003Which of the following values for the LANG variable will configure the system to bypass locale translations where possible? LANG=COMPAT LANG=NONE LANG=C LANG=ENDSetting LANG=C is an alias for Portable Operating System Interface (POSIX) compatibility and will cause programs to bypass locale translations. The other options shown for LANG are not valid.
558102-5002When running useradd, which option needs to be specified in order for the users home directory to be created? -h -m -x -aThe -m option causes the users home directory to be created. By default, if this option isnt specified and CREATE_HOME has not been set, the home directory wont be created. The h option displays help text, and the other options shown are not valid.
559102-5001Which of the following commands locks out password-based login for a user but does not prevent other forms of login? usermod -L userdel -r useradd -h userlockThe usermod -L command locks an account by placing a ! in the encrypted password. If the user has another means to log in, such as with an SSH key, using usermod -L will not prevent their login.
560102-5003If you need to temporarily reconfigure all locale variables and settings for a given session, which environment variable can be used? LC_LIST LC_GLOBAL LC_ALL ALL_LOCALEThe LC_ALL variable can be used to set environment variables to the current locale and will override others. This can be used when there is a need for a temporary change. The other variables listed here are not used for this purpose and are not created by default.
561102-5001Which of the following will run a command called /usr/local/bin/changehome.sh as the www-data user when placed in /etc/crontab? 1 1 * * * www-data /usr/local/bin/changehome.sh www-data changehome.sh */1 www-data changehome.sh * * */www-data /usr/local/bin/changehome.shThe format when adding a username places the username between the schedule and the command to run, making option A correct. The other options shown for this question are invalid. In the case of option B, there is no schedule. In the case of options C and D, the schedule is incorrectly formatted.
562102-5003Which of the following commands produces a report listing the last password change date for all users on the system? passwd -a passwd -S passwd -a -S passwd --allThe passwd command will be used for this purpose. The -a option displays all users but requires the use of -S to indicate status. The -S option alone will not produce a report for all users, and the --all option is an alias for -a.
563102-5004Assume that passwords must be changed every 60 days. Which command will change the date of the users last password change without the user actually changing the account password? chage -f chage -W chage -l chage -dThe chage command is used for this purpose. The -d option sets the days since the last password change and is measured in days since January 1, 1970. The -W option is the days of warning for changing a password, and the -l option displays a list of the various settings related to the account.
564102-5002Which of the following files is used by anacron for reading configuration information related to jobs? /etc/anacron.d /etc/anacrontab /etc/anacron.config /etc/anacron.confThe /etc/anacrontab file contains information about the jobs such as the job name and delay, among other information. The other files listed do not contain anacron-related information about jobs.
565102-5004Which of the following commands is used to add entries to the OpenLDAP database? ldapd adduser addldap ldapaddThe ldapadd command is used to add entries to the OpenLDAP database.
566102-5002Which file contains a list of users who are not allowed to create cron scheduled tasks? /etc/cron.users /etc/cron.deny /etc/cron.denyusers /etc/cron.userlistThe /etc/cron.deny file contains a list of users who cannot create cron scheduled tasks. The other files do not exist by default.
567102-5002You are viewing the /etc/passwd file and see a * where the password should be. What does the presence of a * indicate within the password file? The system uses forward password aging. The system uses shadow passwords. The system has been compromised. Users have a * for their passwords.The system uses shadow passwords if an asterisk shows up in the password field of the /etc/passwd entries. There is no indication that the system has been compromised, making option C incorrect, and there is no password scheme called “forward password aging,” making option A incorrect as well.
568102-5004Which of the following best describes the relationship between UIDs and GIDs on a Linux system? The UID and GID are the same across the system for a given user. Each user has a UID and GID that are the same and are created when the user is" created. ;"The UID represents the user whereas the GID is a globally unique user ID. There is no direct relationship between UID and GID.There is no direct relationship between the UIDs and GIDs on a system. UIDs represent users, whereas GIDs represent group IDs. On some systems, the UID and GID number will match for regular users, but this is not a requirement and is more of a coincidence.
569102-5003Which of the following commands is used to re-create indexes based on existing slapd databases? ldapind ldapindex slapindex indexldapThe slapindex command generates indexes based on slapd databases. The other commands are not valid.
570102-5001Which command is used to change a users home directory to /srv/data/username and move the contents at the same time? usermod -md /srv/data/username <username> homedir -m /srv/data/username <username> userex -m /srv/data/username <username> userchg /m /srv/data/username -d <username>The usermod command is used for this purpose. The -d option changes the home directory, whereas -m moves the contents. The other commands shown for this question are not valid.
571102-5004Which option to useradd will add groups for a user? -g -x -l -GThe -G option is a list of supplemental groups to which the user will be added. A lowercase -g option provides the primary GID. The -l option causes the user to not be added to the lastlog and faillog databases. There is no -x option.
572102-5001Which command will list the cron entries for a given user as denoted by <username>? crontab -l -u <username> crontab -u <username> cron -u <username> cronent -u <username>The crontab command can be used for this purpose, and the -l option is used to list the crontab entries. The -u option is needed to specify a user other than the current user.
573102-5001Which option to useradd creates a system user rather than a normal user? -r -s -a -SThe -r option creates a system user that will typically entail no expiration, no home directory, and a UID below 1000. The -s option defines the shell and is not typically used for this purpose. The -a and -S options do not exist.
574102-5002Which file contains encrypted password information for groups? /etc/group /etc/gshadow /etc/gsecure /etc/group.confThe /etc/gshadow file contains secure information such as an encrypted password for groups, where applicable. The /etc/group file contains general information on groups. The other two files listed as options do not exist.
575102-5004Which of the following commands can be used to help with recovery of a corrupted OpenLDAP database? openldap-recover oreco slapd-recover slapd_db_recoverThe slapd_db_recover command can be used to help recover an OpenLDAP database that has become corrupted or otherwise invalid. The remaining options for this question are not valid commands.
576102-5002Which of the following best describes the use of the groupdel command? You may force group deletion with the -f option. If a users primary group is to be deleted, that user must be deleted first or have their" primary group changed. ;"groupdel can be run at any time, regardless of group membership. The -r option for groupdel will recursively change users GIDs after group deletion.The groupdel command cannot delete groups unless there are no users who have the given group as their primary GID. There is no -f or -r option.
577102-5001Which of the following commands displays the UID, primary group, and supplemental groups for a given user? id getid passwd chageThe id command shows the username, UID, primary group, and GID, along with supplemental groups. The passwd and chage commands are not used for this purpose. There is no getid command.
578102-5004Which option to the usermod command is used to change a given users real name? -R -n -d -cThe -c option changes the comment field in /etc/passwd. The comment field is typically associated with the real name of the account. The -R option indicates a chroot directory, whereas -d indicates a change of home directory. There is no -n option.
579102-5004Assume that you have deleted a user account with UID 1501, including the -r option. Which command should you also run to look for other files that might have been owned by the user? find -id 1501 grep 1501 * grep -u 1501 * find / -uid 1501The find command will be used for this purpose. The correct syntax is shown in option D. The group command will merely look in the specified files for the number 1501, and the -u option to grep includes byte offsets, which is not applicable for this question.
580102-5001On which port does the slapd LDAP daemon listen for connections? 38933893306110The standard port for unencrypted LDAP is 389, and that is the port on which slapd listens for connections. Port 3389 is RDP, whereas 3306 is MySQL. Finally, 110 is POP3.
581102-5001Which of the following commands will set the systemwide time zone to America/Los_Angeles? ln -sf /usr/share/zoneinfo/America/Los_Angeles /etc/localtime ln -sf America/Los_Angeles ; /etc/localtime ln -sd /etc/localtime /usr/share/timezone/America/Los_Angeles ln -sf /etc/localtime /usr/share/zoneinfo/America/Los_AngelesThe ln command is used for this purpose, and the -s option creates a symbolic link, and -f forces or overwrites the destination. The other options or order of commands are not valid.
582102-5003Which locale-related variable is used for currency-related localization? LC_MONE LC_CURRENCY LC_MONETARY LC_CURRThe LC_MONETARY variable is used by certain programs to determine the localization for currency.
583102-5003Which option to systemd-run adds a timed event? --timed --add-timer --on-calendar --on-timeThe --on-calendar option adds a timed event with systemd-run. The other options shown are not valid for use with systemd-run.
584102-5002Which file is used to provide a list of users who can add and delete cron jobs? /etc/cron.job /etc/cron.allow /etc/cron.users /etc/crontabThe /etc/cron.allow file is a list of users who have permission to create and remove their own cron jobs. The /etc/crontab file is used to store cron jobs, and the other files do not exist.
585102-5002Which debug level for slapd is used to provide debugging of configuration file processing? 16480Debug level 64 provides configuration processing debug information. Debug level 1 traces function calls, whereas level 8 shows connection management. Debug level 0 is no debug.
586102-5003Which command deletes an at job with an ID of 3? atdt at -l atrm 3 rmat 3The atrm command removes jobs given their IDs. The ID can be obtained with the atq command. The at -l command shown will list jobs but not delete them. The rmat command is not valid.
587102-5002Which command on a Debian-based system can be used to change the time zone using the package-based tools? dpkg-reconfigure time dpkg-reconfigure tzdata apt-select tzdata apt-config timezoneThe dpkg-reconfigure command is used to cause the configuration questions to be asked again. The tzdata package is the name of the package on Debian-based systems. The two apt- commands shown are not valid.
588102-5004What will be logged with the loglevel set to 0x10 in a slapd.conf configuration file? No debugging Trace debugging Stats logging Packets sent and receivedThere are multiple ways to specify loglevels and debugging for slapd, including by keyword, by integer, or as shown in the question, by hex. All of the values shown are valid for loglevel. No debugging is 0, trace is 1, stats logging is 256 or 512 depending on type, and packets sent and received is integer 16, or hex 0x10.
589102-5001Within which directory should you place files in order for the files to be copied to a users home directory when the user is created? /etc/skel /etc/homedir /home/usertemplate /etc/templateThe /etc/skel directory contains files that are automatically copied to a users home directory when that user is created. The other directories listed for this question do not exist by default.
590102-5002Which command displays a list of jobs currently scheduled with at? atlist atq atl at --jobsThe atq command shows a list of jobs that have been scheduled with the at command. The other commands dont exist with the exception of option D, which shows the at command but with an invalid option, --jobs.
591102-5003On which port does LDAP over SSL listen for connections? 3894436363128The port for LDAPS or LDAP over SSL is 636. Port 389 is standard, non-SSL, LDAP. Port 443 is used for HTTPS, and 3128 is used for Squid proxies.
592102-5001Which scheduler can be used to schedule a command to run once at a certain time? at cron job jobctlThe at command runs a command at a specified time. While cron can be used to run a command, it will run the command repeatedly according to the schedule set for the command. The other commands are not valid.
593102-5004Which file provides a list of users who are allowed to create at jobs? /etc/at.users /etc/at.scheduler /etc/at.conf /etc/at.allowThe /etc/at.allow file is used to specify users who can create at jobs. The other files are not valid.
594102-5002Which file extension is used for systemd timer units? .conf .timer .timerd .timeeventSystemd timer files have the extension .timer and are used for scheduling service unit files or events. The other file extensions are not used for systemd timer units.
595102-5001Within which directory would you find a list of files corresponding to the users who have current cron jobs on the system? /var/spool/cron/crontabs /var/spool/jobs /etc/cron /etc/cron.usersThe /var/spool/cron/crontabs directory contains a file for each user who currently has one or more cron jobs or entries. Note that the other files listed here are not valid for this purpose.
596102-5004When using slapadd for a large import, an error occurs at roughly 90 percent completion. Which option to slapadd enables specification of a line number from which the import will be restarted? -l -f -q -jThe -j option enables specification of a line from which the import will be started. It is useful in the scenario described where the import needs to be restarted due to error. The -f option specifies an alternate location for the slapd configuration file. The -q option is quick mode, with less checking, and -l specifies the input file.
597102-5002Which argument to the locale command displays currently available locales for a given system? -c -a -p -sThe -a option shows all locales currently available on a system. The other options do not produce the output specified in this scenario.
598102-5001Which option to timedatectl sets the system clock? --adjust-system-clock -s -c -aThe --adjust-system-clock option sets the system clock when used with set-local-rtc. The other options are not valid.
599102-5001Which option to the file command displays information on the MIME type of the file being interrogated? -i -m -l -aThe -i option displays information that can help determine the character set such as ISO-8859, ASCII, or Unicode for the given file. The -m option specifies a list of magic files, -l shows a list of patterns, and -a is not a valid option with the file command.
600102-5002Which environment variable is used to set the paper size? LC_PAPERSIZE LC_PAPER LC_PRINTERQ LC_PRINTSIZEThe LC_PAPER variable is used to set the paper size for printing. The other variables are not available by default.
601102-5003Which of the following is used as a systemwide cron file? /etc/cron.d /etc/cron.sys /etc/crontab /etc/cron.tabThe /etc/crontab file is a plain-text file that is treated as a systemwide cron file. As such, the file is generally not associated with any single user and its not necessary to run a special command after editing this file.
602102-5004Which command can be used to view the available timezones on a system and obtain out- put that can be used in scripts for setting the time zone? tzd /etc/locale tzdata tzselectThe tzselect command will, by default, display a step-by-step menu to select a time zone. The eventual output will include a region/time zone line, such as America/Chicago, as output.
603102-5001Which option within a systemd timer unit will start a timer 90 minutes after boot? OnBootSec=90min OnBoot=90min OnBootHour=1.5 StartOnBoot=90minThe OnBootSec option is used for this scenario and option A has the correct syntax. The other options shown do not exist.
604102-5002Which abbreviation is another name for information like the users full name, telephone number, and other contact information found in /etc/passwd? USERINFO GECOS HOMEINFO CDATAGECOS is the legacy name for information stored in /etc/passwd such as full name and other contact information.
605102-5001Which option to the groupadd command specifies the GID for the group? -g -a -h -kThe -g option sets the group ID for the newly created group. The -h option is help, and neither -k nor -a exists as an option for groupadd.
606102-5003When working with systemd timer units, which option to systemctl displays the active timers? list-timerunits show-timers list-timers list-activetimersThe list-timers option shows the currently active timers with systemd. The other options are not valid.
607102-5002Which shortcut to the OnCalendar systemd timer function indicates that the timer unit should run once a week? OnceAWeek weekly everyweek oneperweekThe weekly shortcut means that systemd will execute the event once a week. The other shortcuts given as options are not valid.
608102-5001Which option to the crontab command removes the current crontab? -r -l -g -fThe -r option removes the current crontab. The -i option can be added so that the user is prompted prior to removal.
609102-5002Which variable in /etc/default/useradd controls the location of the skeleton home directory? SKELETON SKEL SKELDIR SKELLOCThe SKEL variable controls the location of the skeleton home directory, which is normally /etc/skel/ by default. The other options shown are not used for the purpose described.
610102-5003Which option to getent enumerates the password database for a given system? password listpass passwd showpassdbThe passwd option is used to list the password database on a system. The other options do not exist.
611102-5001Which directory contains the jobs scheduled with at? /var/spool/cron/atjobs /var/spool/at /var/spool/cron/at /var/spool/atjobsThe directory /var/spool/cron/atjobs contains the jobs. The other directories shown do not exist.
612102-5003Which variable in /etc/login.defs controls the minimum group ID to use on the system? GIDMIN GROUPID_MIN GID_MIN MIN_GIDThe GID_MIN variable contains the minimum GID to use on the system. The other variables are not used for the purpose described.
613102-5004Which variable in /etc/login.defs contains the location of a users email directory for use by programs such as userdel? EMAILDIR DIR_EMAIL MAILDIR MAIL_DIRThe MAIL_DIR variable contains the directory where a users mail spool is located. The other options shown are not valid variables for this purpose.
614102-5003Which file contains user information such as username and real name and is readable by all users of the system? /etc/pass /etc/shadow /etc/passwd /etc/userinfoThe /etc/passwd file contains various information about users on a system such as username and real name, along with user ID (UID) and login shell. The file is world-readable.
615102-5003Which shortcut can be used to indicate that a cron job should be executed on restart? @restart @startup @reboot @onbootThe @reboot shortcut indicates that the cron job will be executed when the system starts up.
616102-5001Which option to groupadd specifies that the group will be a system group? -r -m -j -bThe -r option specifies that the group being added will be a system group.
617102-5001Within which directory are databases stored for OpenLDAP? /var/lib/ldap /var/cache/openldap /var/share/ldap /usr/share/openldapThe directory /var/lib/ldap stores database files related to the OpenLDAP deployment on a given server. The other directories shown are not valid for this purpose.
618102-5001When listing systemd timer units, which option to list-timers shows both active and inactive units? --all --active-and-inactive --inactive All are shown by default.Only active units are shown by default, so the --all option displays all units.
619102-5002Which file provides a list of users who are not allowed to create at jobs? /etc/at.allow /etc/at.deny /etc/at.denyusers /etc/at.conf.denyThe /etc/at.deny file contains a list of users who cannot create at jobs.
620102-5003Which of the following commands is used to examine the systemd journal or log file? journallist ctlj journalctl jctlThe journalctl command is used to work with the systemd journal. On systemd-based systems, journalctl is a central command for debugging and troubleshooting.
621102-5003Which system logging facility is used for messages from the kernel? syslog kernel kern systemThe kern facility receives messages from the kernel for logging purposes. Of the other options, syslog is used for logging messages about syslog itself. The other two options shown are not valid syslog facilities.
622102-5004To what server address can you set a Network Time Protocol (NTP) client in order to receive time from a regionally local server? 127.0.0.1 192.168.1.100 ntp.example.com pool.ntp.orgntp.org provides a free service for time synchronization. When you use pool.ntp.org as the target, you will typically receive an NTP server that is geographically close to your location, or at least as close as possible. Setting your address to 127.0.0.1 or 192.168.1.100 will use a local server but only if that server has an NTP service.
623102-5001What is the name of the systemd service that provides logging facilities? systemd-journald systemd-loggingd systemd-syslog journalctlThe service used for logging on a computer managed by systemd is called systemd-journald. You use the journalctl command to view logged entries rather than the standard Linux toolset.
624102-5002Which option within a logrotate configuration stanza informs logrotate to create a new log file owned by the user and group www-data and with permission 600? new www-data.www-data mode 600 create 600 www-data www-data new 600 www-data createlog mode 600 user www-data group www-dataThe create option is used for this purpose and accepts arguments such as those shown to set the permissions and ownership. The other options shown are not valid within a logrotate configuration.
625102-5004Within which directory hierarchy will you find configuration files related to printing with the Common UNIX Printing System (CUPS) printing system? /etc/cupsd /etc/cups.d /etc/CUPS /etc/cupsConfiguration files for CUPS are found in /etc/cups. However, it is also common to manage CUPS through its web interface. The other directories listed are not valid.
626102-5001Which access control directive in a CUPS configuration file configures the system to accept connections from the local network with addresses from 192.168.1.1 through 192.168.1.127? Allow 192.168.1.0/25 Allow 192.168.1.0/24 Allow 127.0.0.0/8 AllowHosts 192.168.1.0The Allow directive is used for this purpose and the addresses 192.168.1.1 through .127 signify a /25 in Classless Inter-Domain Routing (CIDR) notation, making option A correct. Note that option B, with a /24 netmask, would allow the addresses too but would also allow 192.168.1.128 through .255, which is larger than should be allowed.
627102-5002Which of the following commands will set the date immediately and can be used from the command line in a script? ntpd ntpdate pool.ntp.org settime timeThe ntpdate command provides a command-line interface that immediately changes or sets the time according to the NTP server given as its argument. The ntpd option provided in option A will run the NTP daemon and would not be appropriate for a script. The other two commands are not valid. It is worth noting that ntpdate has been deprecated in favor of ntpd, but you will likely find ntpdate available on many systems.
628102-5002When executing the ntpq command, you receive a message like read: Connection refused. What would this typically indicate? The network is down. The NTP daemon is not running. The use of NTP is administratively prohibited. The current user does not have permission to execute ntpq.Typically, the Connection refused message from an NTP-related command means that the daemon is not running. There is no indication that the ntpq command is querying a different server; therefore, whether the network is up or down is irrelevant. The permission-based options are not valid based on the error message indicated.
629102-5004Which command is used to query and work with the hardware clock on the system? hwc ntpdate systime hwclockThe hwclock command is used to both query and set the hardware clock, such as the one maintained by the system firmware or basic input/output system (BIOS). The ntpdate command is used to set the local system time but is not related to the hardware clock. The other commands are not valid.
630102-5003Which directory contains a listing of available time zones on a Linux system? /etc/timezones /etc/tzdata /usr/share/zoneinfo /usr/share/timezonesThe /usr/share/zoneinfo directory and its child directories contain information on time zones on a Linux system. The other files and directories do not exist by default.
631102-5004Which syslog level is used to provide informational messages? kern emerg debug infoThe info severity level provides information messages for a given facility. Of the options given, emerg is used for emergency messages and not normally used by applications, whereas debug is the highest or most verbose level of logging available through syslog.
632102-5002Within /etc/ntp.conf, which of the following configuration lines sets the location of the drift file? drift /var/lib/ntp/drift driftfile /var/lib/ntp/drift drift-file /var/lib/ntp/drift driftconfig /var/lib/ntp/driftThe driftfile configuration option sets the location of the driftfile for ntpd. The drift file helps to maintain time accuracy. The location shown is the default for Red Hat Enterprise Linux.
633102-5001Which configuration option in /etc/logrotate.conf will cause the log to be emailed to admin@example.com when the logrotation process runs for the selected log? mailadmin@example.com sendmailadmin@example.com maillogadmin@example.com logmailadmin@example.comThe mail option is used to send the log to the specified email address on completion of the logrotate process. The others shown do not exist as options in /etc/logrotate.conf.
634102-5003Which of the following commands is used to determine the amount of disk space used by systemd journal logfiles? journalctl --disk journalctl -du journalctl --disk-usage journalctl -lsThe journalctl command is used for this purpose, and the --disk-usage option displays the disk space used by journal log files, which are typically stored in /var/log/ journal.
635102-5004Which of the following commands displays the current mail queue on a Postfix server? qmail mailqueue mail -q mailqThe mailq command is used on Postfix servers in order to view a summary of the current mail queue. Details of the queue include the ID of the mail being sent along with one or more of the email addresses involved in the transaction. The mailq command may also work with newer versions of sendmail.
636102-5003When youre running the NTP daemon, which command can you execute to work with the NTP server in an interactive mode? ntpd ntpdate ntpq ntp-interactiveThe ntpq command provides an interactive, menu-like interface into the NTP server. You can use ntpq to check statistics on peers, for example. The ntpdate command shown as option B is used as a command-line means to set the time. The ntpd command shown as option A would execute the NTP daemon itself.
637102-5004Assume that you want all email for the root user to be sent to admin@example.com. Which of the following lines in /etc/aliases will accomplish this task? admin@example.com -> root root ->admin@example.com root,admin@example.com root:admin@example.comThe format is user: destination for the aliases file, making option D correct. The other options are not valid syntax for the aliases file.
638102-5002When youre working with klogd, which option can be used to control the file to which messages are logged? -d -f -v -lThe -f option indicates the file to which messages will be logged. The -d option is used for debugging, whereas -v prints the version of klogd. There is no -l option for klogd.
639102-5001Which set of programs or packages can be used for setting the system time on a device that is offline frequently? chrony htpoffline ntpd-off chrondateThe chrony package is used for the scenario described and helps with systems that are frequently offline or disconnected from the network. The other packages listed as options are not valid for the purpose described.
640102-5001Which of the following commands places a file into the print queue? lpr lpd lpq lpxThe lpr command places a file (or standard input) into the print queue for lpd to work with. The lpq command prints the current queue. There is no lpx command.
641102-5003Which of the following options to the sendmail command will print information about the mail queue? -bi -queue -bp -fThe -bp option to the sendmail command prints information about the current queue. There is no -queue or -f option that is relevant for this question. The -bi option is used to work with the aliases database.
642102-5001Which function of the hwclock command will set the hardware clock to the current system time? -w -s -a -mThe -w option sets the hardware clock to the current system time. The -s option does the opposite, setting the system time to the hardware clock. There is no -a or -m function for hwclock.
643102-5004What is the default port for the CUPS administrative web interface? tcp/53 tcp/8080 udp/456 tcp/631TCP port 631 is used as the administrative interface into CUPS. Visiting an active CUPS server on that port will show the administration website for working with print queues and other configuration items related to CUPS.
644102-5001Which of the following commands causes sendmail to attempt to deliver the messages in its queue? sendmail -q sendmail -b sendmail -f sendmail -vThe -q option causes sendmail to attempt to deliver messages from the queue. Add the -v option to display verbose output.
645102-5002You need to create an email address to accept email for abuse@example.com. However, you would like abuse reports sent to multiple email addresses within your organization. Which of the following will send email destined for the abuse account to admin@example.com and security@example.com? Create a .forward in the home directory for the abuse user and forward email" accordingly. ;"Within /etc/aliases, add this: abuse:admin@example.com,security@example.com. Create a .forward file for root and forward email accordingly. Within /etc/aliases, add this: abuse:admin@example.com\tsecurity@example.com.The requirements of multiple email addresses prevent the use of .forward; therefore, it will need to be accomplished in /etc/aliases. The format for multiple email addresses is to separate them with a comma, making option B correct.
646102-5001Which of the following commands sets the hardware clock to Coordinated Universal Time (UTC) based on the current system time? hwclock --systohc --utc hwclock --systohc --localtime hwclock --systohc hwclock --systoutcThe --systohc command will set the hardware clock according to the current system time. The use of --utc is required in order to ensure that the time is set to UTC. If --utc is omitted, the time will default to whatever was used last time the command was run, which could be UTC but might also be localtime instead. Therefore, the best option is A.
647102-5004You need to delete all messages from the queue on a Postfix server. Which of the following commands will perform this action? postqueue -remove rm -rf postfix -f postsuper -d ALLThe postsuper -d command deletes messages from the queue. The ALL keyword causes all messages to be deleted from the queue. Care should be taken when performing this action because it is irreversible. There is no -remove option to postqueue, and the -f option for Postfix is not relevant. The rm -rf command shown is not specific enough, and it is generally not recommended to manually remove files from a mail queue.
648102-5001Which of the following URLs can be used to view a list of completed print jobs in CUPS? http://localhost:631/jobs?which_jobs=completed http://localhost:631?completed http://localhost:631/?completed http://cups/jobs=completedThe URL shown will display the jobs area of the local CUPS server with a query string name of which_jobs and a value of completed. The other URLs shown are not valid.
649102-5003Which option to the journalctl command will continuously update the display as new log entries are created? -tail -t -f -lJust as the tail -f command will continuously update the display as new content is added, so too does the -f option display new entries for journalctl. The -t option shows messages for the given syslog identifier. There is no -tail or -l option.
650102-5002Assuming that the $ModLoad imudp configuration option has been set in the configuration for rsyslogd, which of the following additional options is necessary to configure the port on which the server will listen? $Port 514 $UDPServerRun 514 $Listen 514 $UDPListen 514The $UDPServerRun option is used for the purpose described. The port on which the server should listen is then provided as the value for this option. The other options shown are not valid configuration items for rsyslogd.
651102-5001Which of the following commands causes the mail queue to be processed on a Postfix server? postqueue -f postqueue -D postfix -q postsuper -qThe postqueue -f command is used to flush the queue. The command will process all of the emails that are awaiting delivery. The other commands are not valid for this purpose.
652102-5003When running ntpd, the server will not adjust or synchronize if the time is skewed from the NTP server by a significant amount of time. Which option to ntpd disables this and causes the synchronization process to continue even if there is a large skew? ntpd -noskew ntpd -skewcheck=off ntpd -g 0 ntpd -s 0The -g option specifies the maximum offset or skew that can be adjusted for when synchronizing time. When set to 0, there is no offset check.
653102-5001Which option in journald.conf controls the maximum file size for individual journal logs? SystemMaxFileSize MaxFile LogFileSize LogSizeThe SystemMaxFileSize option controls the size of the journal log file to ensure that a log does not cause problems related to disk usage. The SystemMaxUse option controls overall size of journal files, and the default for SystemMaxFileSize is one-eighth of the SystemMaxUse setting to allow for rotation of files.
654102-5003Which command can be executed to view completed print jobs? lpstat -q lpq lpstat -W completed lpqueue -cThe lpstat command is used for this purpose. The lpstat command displays information about printers, print jobs, and related information. The -W option specifies which jobs to display, complete, or not complete. The lpq command shown as an option is used to view the queue, and the other options are not valid.
655102-5004When configuring a log file for rotation, you need to execute a command to run a script after log file rotation. Which option within the logrotate.conf configuration file can be used to facilitate this behavior? after-rotate run-script rotatecomplete postrotateThe postrotate option within a configuration for log rotation can be used for this purpose. After postrotate, a line typically follows with the script or commands to execute. The other options shown for this question are not valid.
656102-5002You are deploying an Exim server and need to work with the firewall to ensure the proper incoming ports are open. Which protocol and port should you allow inbound for normal Simple Mail Transfer Protocol (SMTP) traffic? TCP/23 TCP/25 TCP/110 TCP/143SMTP operates on TCP port 25, and if other servers are contacting your SMTP server, then youll need to listen on this port and allow traffic to it as well. Port 23 is used for telnet, port 110 is POP3, and port 143 is Internet Message Access Protocol (IMAP), none of which are necessary for SMTP traffic.
657102-5001Which command should be executed after making a change to the sendmail access database /etc/access? makemap makedb newaccess rebuilddbThe makemap command is used to create the hashed database in the correct format for sendmail to use. The other commands are not valid for sendmail.
658102-5001When working with syslog-ng, which of the following is the correct path and filename for the primary configuration file? /etc/syslog-ng/syslog-ng.conf /etc/syslog/syslog-ng.conf /etc/syslog-ng/ng.conf /etc/syslog-ng/ngd.confThe configuration file for syslog-ng is stored in /etc/syslog-ng and is named syslog-ng.conf. There is not typically an /etc/syslog directory, even on systems without syslog-ng.
659102-5003A developer has created an application and wants to take advantage of syslog for logging to a custom log file. Which facility should be used for an application such as this? syslog kern local# userThe application could theoretically use any of the logging facilities, depending on the type of application being developed. However, the requirement to log to a custom log file means that the logs will have a different name and possibly location than the standard logs. Therefore, logging to any of the standard or system-level facilities is not appropriate for this scenario, making one of the local (local0 through local7) facilities appropriate.
660102-5002A user needs to work with printer-related items. Which of the following commands adds the user (called username in the options) to the appropriate group for this purpose? usermod -aG printerusers username usermod -aG lpadmin usernameusermod -gA lpadm username usermod -a lpadm usernameThe usermod command with the -aG option is used to append a group onto the users list of groups. In this case, the user needs to be a member of the lpadmin group.
661102-5004Which option within a logrotate configuration file disables compression of the log file? compressoff limitcompress nocompression nocompressThe nocompress option is used to prevent the log file from being compressed or zipped as part of the rotation process. This might be needed on systems where compression negatively affects performance or where additional processing is necessary.
662102-5003Which command should be used to enable printer sharing through CUPS? cupsctl --enable-sharing cupsc --share cupsctl --share-printers cupsc --printer-sharingThe cupsctl command should be used with the --share-printers option to enable printing for remote clients within the same subnet. You would then also flag each printer for sharing with the lpadmin command, setting the printer-is-shared option to true.
663102-5002Which command can be used to gather and display statistics about mail processed on a server running sendmail? mailq mailstats statmail sendmailstatsThe mailstats command is used for the purpose described. Of the other options, the mailq command will display the current mail queue but not statistics on mail that has been processed. The other two options are not valid commands.
664102-5002You need to determine the size of the systemd journals on the system. Which option to journalctl is used for this purpose? --disk-use --disk-usage --disk-space --disk-usedThe --disk-usage option shows the amount of space consumed by active and archived journals. The other options shown are not valid.
665102-5001You are troubleshooting a problem with printing and believe the CUPS service needs to be restarted. Which of the following commands can be used to restart CUPS on a server run- ning systemd? systemctl restart cups.service systemctl restart cups-service systemctl reboot cups.target systemctl restart cups.targetThe systemctl command is used for controlling services. In this case, restart should be sent to the CUPS service as denoted by the name cups.service.
666102-5004You are working with journalctl and need to see only messages that are at a debug priority. Which of the following options enables this scenario? -pri debug -prior debug -d debug -p debugThe -p option is used to filter based on priority and the loglevel given in the scenario is debug, making option D correct. The other options are not valid for the purpose described.
667102-5001Which option in a CUPS configuration file causes the daemon to listen on all interfaces on port 631? Port 631 Listen All:631 Listen 127.0.0.1:631 Port All:631The Port configuration option is used for this purpose and is used as an alternative to the Listen directive. With the Listen directive, you will specify address:port. However, option C, while valid syntactically, will listen only on the localhost IP of 127.0.0.1 and not all interfaces.
668102-5001Which command is used to remove an email from the mail queue with Postfix? postsuper -d postmaster postfix -d postdelThe postsuper command is used for management of various items with Postfix, including deletion of individual messages from the mail queue. The other commands will not work for the purpose described.
669102-5002Which option to journalctl will clear logs older than five days? --clear=5d --vacuum-time=5d --delete-older=5d --clear-time=5dThe --vacuum-time option will be used for this scenario. Time can be specified in seconds, minutes, hours, days, months, weeks, and years.
670102-5002When configuring email forwarding with Procmail, which of the following files is used as a user-based configuration file for Procmail? /home/procmail.conf ~/.procmailrc /etc/procmail.conf ~/procmail.confThe file .procmailrc, found in a users home directory, is used by Procmail for processing messages on a per-user basis. The other files are not used by Procmail in a default configuration.
671102-5004Which of the following definitions in /etc/aliases will deliver mail destined to root to two email addresses, admin@example.com and webmaster@example.com? [root] =admin@example.com, webmaster@example.com root: admin webmaster root: admin, webmaster root:admin@example.com, webmaster@example.comThe format is local-address: destination-address. Each destination address is separated by a comma. The difference between options C and D is that the question specifically asked for addresses @example.com and since the question didnt specify whether this server was the server for @example.com, the destination addresses needed to be fully qualified.
672102-5004Which of the following commands views the contents of a message that exists in the Postfix queue? postshow postless postmore postcatThe postcat command shows the contents of a message from the Postfix queue. The other commands shown are not valid.
673102-5003Within which file will you find errors related to delivery of mail on a Postfix server? /var/log/mail /var/log/postfix.log /var/log/mail.err /var/log/postfix.errThe /var/log/mail.err file contains errors related to mail delivery. However, on some systems, mail-related errors may go to a different log, such as /var/log/mail.log or /var/log/mail.info or similar.
674102-5004When testing SMTP communications between a client and a server, you need to begin the conversation. Which of the following lines shows the beginning of an SMTP conversation using Extended Hello syntax from mail.example.com? BEGIN mail.example.com SMTP mail.example.com HELO mail.example.com EHLO mail.example.comThe EHLO command indicates Extended Hello syntax and is followed by the host from which communication has been initiated. Of the other options, the HELO option is valid but is not the Extended Hello syntax specified in the question.
675102-5001Which option to timedatectl shows the available time zones? list-timezones show-tz --tzinfo --timezonesThe list-timezones option to timedatectl shows the names of time zones and is useful for obtaining the correct time zone name. The other options are not valid with timedatectl.
676102-5001You are viewing a directory listing of the /etc/localtime file and it looks like the following: lrwxrwxrwx 1 root root 35 Oct 30 2018 /etc/localtime -> /usr/share/zoneinfo/America/Chicago From that directory listing, what can you tell about the file? The file is a symlink to a timezone in /usr/share/zoneinfo. The /usr/share/zoneinfo file is a symlink to /etc/localtime. The /etc/localtime file is a hard link to /usr/share/zoneinfo. The time zone cannot be set because the file must exist as its own separate file.The /etc/localtime file is a symlink to /usr/share/zoneinfo/America/Chicago, making option A correct. Some systems also link /etc/timezone for the same purpose.
677102-5001You need to set the correct time zone on a server. How can you tell what the current time zone is set to? Run the date command. Run the tzdata command. Examine /proc/timezone. Examine /etc/tzdata.The date command shows the current time zone. The other options shown will not work.
678102-5003Which of the following is the configuration file used by the Chrony package? /etc/chrony.cfg /etc/chrony/default.cfg /etc/chrony.conf /etc/chrony.d/chrony.cfThe /etc/chrony.conf file is the configuration file used by the Chrony package. The other files do not exist by default.
679102-5003Which option to journalctl queries for only kernel messages? -ok -okern -k -limitkThe -k option shows kernel messages only when used with journalctl. The other options shown do not query the journal.
680102-5002Which command must you run after making a change to email aliases on a server running Postfix? service postfix restart newaliases alias -n postfix -eThe newaliases command re-creates the aliases database on servers running Postfix, sendmail, and qmail. There is no need to restart the mail server after running newaliases. The alias command shown in option C will create an alias for the command shell but is not related to Postfix.
681102-5004You need to log output to the systemd journal from a script. Which of the following commands facilitates this scenario? systemd-log systemd-logger systemd-logm systemd-catThe systemd-cat command logs to the systemd journal. When given a parameter such as a command, both STDOUT and STDERR are logged. The other commands shown as options are not valid.
682102-5001Which command can be used to remove print jobs from the queue? lprm lpdel lpqman lprmjThe lprm command is used to help manage printer queues by removing jobs. The other commands shown are not valid.
683102-5004When running from a shell script, which command enables logging to syslog? logd login logit loggerThe logger command is used to send messages to syslog and can be executed in a shell script context in order to take advantage of the robustness of syslog without having to write separate log management into the script.
684102-5003You need to find the mail queue path on a Postfix server. Youre using postconf -d to view all parameters. Which parameter contains the mail queue path on a Postfix server? mqueue queue_dirmailq_path mqueue_pathThe mailq_path parameter contains the path to the mail queue for Postfix. You can use this to diagnose problems with the queue directories. The other parameters shown are not valid in Postfix.
685102-5004Which of the following options can be given to journalctl in order to filter based on a service name? _SYSTEMD-SERVICE _SERVICENAME _SYSTEMD_SERVICE _SYSTEMD_UNITThe _SYSTEMD_UNIT filter can be used to show messages related to a single service. Multiple _SYSTEMD_UNIT arguments can be given to show messages for multiple services. The other options shown for this question are not valid.
686102-5003Which command can be used to add a job to a print queue? lpadd lkp lp lpprintThe lp command, usually used with the -d option to specify the queue name, is used to add a job to the specified print queue. The other commands shown as options are not valid.
687102-5002Which of the following files enables per-user email forwarding? ~/.mailforward ~/.forward ~/.formail ~/.forwardmailWhen the .forward file is found within a users home directory, forwarding of email will typically occur when mail is destined for that user.
688102-5002Which argument to the mail command sets the subject for the email to be sent? -E -s -c -fThe -s option sets the subject for the email to be sent. The -E option informs mail to not send messages that have an empty body. The -c option enables setting of carbon-copy (CC) addresses. The -f option specifies an alternate mailbox and would not be used for this scenario.
689102-5004Which option to the date command can be used to set the date and time? date -f date -t date --change date -sThe -s option sets the date and time as specified within the command. If there is another means to automatically set the date, it may override the change. For example, if ntpd is running, that process may alter the date even after it has been set with date -s.
690102-5002Which option to journalctl will trim the journal data size so that it consumes the amount specified? --clear-size --vacuum-size --delete-size --consume-maxThe --vacuum-size option to journalctl will trim the journal data files so that they consume the specified size. It is worth noting that the size may not be exactly that specified because journalctl deletes only archived files.
691102-5001Which option to journalctl filters based on time? --since --time --time-t --filter-timeThe --since option filters journal messages based on the time elapsed since that specified. There is also a corresponding --until option that enables further time filtering.
692102-5003When viewing the syslog configuration, you notice a minus sign () preceding several log files. What is the significance of the sign in the configuration? The use of indicates that the log may be rotated any time. The use of indicates that the system can utilize other logging facilities when" appropriateThe use of omits the disk sync process for every entry into the log. The use of comments out the line.The use of - indicates that syslog does not need to sync to disk for every log entry. This can greatly improve performance for busy systems but may cause log entries to be lost if the sync process has not been run prior to a system crash or other issue.
693102-5001Which option to lpr sends a print job to a given destination? -P -a -p -hThe -P option sends a print job to the specified destination. Of the other options shown, -h disables banner printing, and the remaining options do not exist for lpr.
694102-5003Which Postfix-related command is used to provide an overview of the number of messages in the incoming and active queues arranged by age? queuelist postq qshape queueshowThe qshape command displays information regarding the number and age of the messages in the Postfix incoming and active queues. Other queues can also be viewed using the command as well. The other commands shown as options for this question are not valid.
695102-5004Within the journald configuration file, which option is used to configure the maximum space used by journal files? SystemFileSizeLimit SystemMaxFile SystemMaxSize SystemMaxUseThe SystemMaxUse configuration option configures how much space journal files can take on the system. The other options shown are not valid, but it is worth noting that there are several options for controlling journal sizes and these options should be examined as part of preparation.
696102-5003Within which directory hierarchy are queue-related messages stored for Postfix? /var/mqueue /var/spool/mailq /var/spool/postfix /var/postfixThe /var/spool/postfix directory contains directories and files related to the mail queue for Postfix. The other directories listed are not valid for this scenario.
697102-5004Which option to journalctl can be used to specify an alternate location for journal data, such as might be the case when retrieving journal data from a rescue system or a filesystem copy? --alt --journal-location --journal-dir --directoryThe --directory or -D option can be used to specify an alternate location for the journal data and would support the scenario described. The other options are not valid with journalctl for the scenario described.
698102-5003Within which directory are system logs normally kept on a Linux system? /etc/logs/ /var/logs/ /var/log/ /tmp/log/The /var/log/ directory is the normal location for system logs, and daemons will typically use this hierarchy for logs as well. For example, some Linux distributions use /var/log/journal/ for systemd journals. The other directories shown as options do not exist by default.
699102-5003Which shortcut can be used as the destination in an Exim alias to prevent Exim from delivering mail to a certain address, such as when you want to essentially delete the mail rather than deliver it? :del: :block: :blackhole: :deletemail:The :blackhole: option can be used as a destination to prevent Exim from delivering the mail for that particular user or email account. The other options shown for this question are not valid.
700102-5003Which stanza within a CUPS printers.conf configuration file is used to configure a default local printer with CUPS? <LOCAL printerName> <Printer printerName> <DefaultPrinter printerName> <PrintDefault printerName>The <DefaultPrinter printerName> stanza, where printerName is the name of the printer, configures a printer for CUPS.
701102-5003Which of the following commands can be used to remove all jobs queued for printing? lprm --all lprm --del A lprm - lprm --remove ALLThe lprm command can be used for this purpose and, when given a single dash, will delete all jobs from the queue if run as root. The other options given for lprm are not valid.
702102-5002When using the mail command, which option enables setting the From header? -f -r -o -mThe -r option enables setting the From header of the email to be sent rather than the currently logged-in user. The -f option specifies a different mailbox and is not useful for this scenario. The -o and -m options do not exist.
703102-5002Which character sequence is used to precede the host or IP in order to specify that TCP should be used for remote system logging in /etc/rsyslog.conf? @TCP @@ @ :tcp@The @@ symbol specifies that TCP should be used rather than the default @ that normally precedes a host using UDP for remote logging.
704102-5003Within the /etc/systemd/journald.conf file, which key/value pair will enable the journal to be persistent? Keep=All Store=Persistence Storage=Persistent Keep=PersistThe Storage=Persistent key/value pair within the [Journal] stanza of the configuration file enables persistent storage for the journal. The other key/value pairs are not valid.
705102-5001Which command can be used to monitor the status of chronyd? chronyc chronystat chrony-stats chronyd-statThe chronyc command can be used for monitoring the status of time updates. The other options shown are not valid commands.
706102-5003Within which directory will you find configuration files for various logs that are to be rotated with logrotate? /etc/logrotate /etc/logs /etc/logrotate.d /var/spool/logrotateIndividual configuration files for various log file rotation policies are found in /etc/logrotate.d. This directory is included in the primary configuration file /etc/logrotate.conf.
707102-5001Which of the following commands is used to view the pending messages queue on a Postfix server? postqueue -p postconf -pending postqueue -f postsuper pendingThe postqueue -p command and option view the pending queue. The postqueue -f command causes the queue to be flushed. The other commands shown are valid, but their options are not.
708102-5001Which of the following commands shows the current default route without performing Domain Name System (DNS) lookups on the IP address(es) involved? netstat -rn netstat -n netstat -r netstat -fThe netstat command can be used for this purpose, and the -r option displays the current routes. The addition of -n prevents DNS lookups, which can help with performance.
709102-5001You are having difficulty with an interface on the server and it is currently down. Assuming that there is no hardware failure on the device itself, which command and option can you use to display information about the interface? ifconfig -a ifup netstat -n ifconfigThe ifconfig command will be used for this purpose and requires the addition of the -a option because the adapter is currently down. The ifup command can be used to bring up an interface but does not display information by default. The netstat command displays information about the network but not with the -n option.
710102-5004Which of the following is not used as a private address for internal, non-Internet, use? 172.16.4.2 192.168.40.3 10.74.5.244 143.236.32.231Private IP addresses are found within the 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 ranges, making an address in the 143 range a public IP.
711102-5003Which of the following commands adds a default gateway of 192.168.1.1 for interface eth0? route add default gateway 192.168.1.1 eth0 eth0 --dg 192.168.1.1 route add default gw 192.168.1.1 eth0 route define eth0 192.168.1.1The route command is used for this purpose, and adding a route is done with the add option. The default gateway is added using the default gw keywords followed by the IP of the gateway and the adapter.
712102-5001Which option for the host command will query for the authoritative name servers for a given domain? -t ns -t all -ns -namedThe host command enables changing of the query type with the -t option. Using ns as the type will query for the name servers for a given domain. There is no all type, and the other options are also invalid.
713102-5002Which port(s) and protocol(s) should be opened in a firewall in order for the primary and secondary name servers to communicate for a given domain? udp/53 Both tcp/53 and udp/53 tcp/53 udp/53 and tcp/503Traditionally, udp/53 is used for DNS queries, but with a primary and secondary server it is assumed that zone transfers may occur. DNS zone transfers typically take place over tcp/53.
714102-5002Which option for the ping command enables you to choose the interface from which the Internet Control Message Protocol (ICMP) packets will be generated? -i -I -t -aThe -I option enables the choice of interface. A lowercase -i option sets the interval, whereas -a indicates an audible ping. Finally, -t enables a time-to-live (TTL)-based ping only.
715102-5004You need to split a subnet to enable four subnets with up to 30 hosts each. Which subnet mask, in Classless Inter-Domain Routing (CIDR) notation, facilitates this scenario? /25 /24 /32 /27A /27, with a netmask of 255.255.255.224, splits a subnet into four segments of 32 addresses, thus enabling 30 usable addresses.
716102-5001Which of the following commands queries for the mail servers for the domain example.com? dig example.com mx dig example.com host -t smtp example.com dig example.com smtpThe host or dig commands can be used for this purpose by setting the type to mx. The mx type will query for the mail exchanger for the given domain. There is no smtp type.
717102-5002Which of the following addresses represents the localhost in IPv6? 0:1 ::1 127:0:1 :127:0:0:1The localhost address for IPv6 can be written as ::1. Addresses shown like 127 represent the IPv4 localhost range but are not written properly for IPv4 or IPv6.
718102-5001Which option to the traceroute command will use TCP SYN packets for the path trace? -T -t -s -iThe -T option causes traceroute to use TCP packets. This option, which requires root privileges, can be helpful for situations where a firewall may be blocking traceroute traffic. The -i option chooses the interface, whereas -s chooses the source address. A lowercase -t option sets the Type of Service (ToS) flag.
719102-5003Which of the following commands will attempt to bring online all interfaces marked as auto within the networking configuration? ifconfig -a ifup auto ifup -a ifstatThe ifup command is used to bring up network interfaces, and the -a option brings up those interfaces marked as auto. Likewise, ifdown can be used to turn off network interfaces. The ifconfig -a command displays information on all interfaces, and there is no ifstat command.
720102-5004In a scripting scenario, which command will return the domain name configured for the server? dnsname fqdn hostname hostname -dThe hostname command is used to return the hostname and domain. When given the -d option, just the domain name is returned to STDOUT, thereby making it appropriate for use in a script.
721102-5001Which command can be used to listen for netlink messages on a network? ip monitor netlink -a ip netlink routeThe ip command with the monitor option/subcommand will display netlink messages as they arrive. There is no netlink subcommand for ip, and the route command will not work for this purpose.
722102-5004If the traceroute6 command is not available, which option to the traceroute command can be used for an IPv6 traceroute? -ipv6 -net6 -v6 -6The -6 option, as in traceroute -6, executes an IPv6 traceroute. The other options shown for this question are not valid. It would be rare for the traceroute6 command to not be available and still have the traceroute -6 command available.
723102-5001Which of the following configuration lines in /etc/nsswitch.conf causes a lookup for group information to first use local files and then use LDAP? group: files ldap lookup: group [local ldap] group: [local ldap] group: localfiles ldapThe syntax is database: databasename with additional database names separated by spaces, as shown in the correct option for this question.
724102-5001Which of the following dig commands sends the query for example.com directly to the server at 192.168.2.5 rather than to a locally configured resolver? dig example.com @192.168.2.5 dig -t 192.168.2.5 example.com dig -s 192.168.2.5 example.com dig server=192.168.2.5 example.comThe @ symbol is used to indicate a server to which the query will be sent directly. This can be quite useful for troubleshooting resolution problems by sending the query directly to an authoritative name server for the domain. Of the other options, -t sets the type and the others are not valid.
725102-5004Which ports need to be allowed through the firewall for Simple Network Management Protocol (SNMP) traffic? Ports 23 and 25 Ports 110 and 143 Ports 80 and 443 Ports 161 and 162SNMP traffic takes place on ports 161 and 162. Though the traffic is usually on UDP, the TCP ports are also reserved for SNMP. Ports 110 and 143 are used for POP3 and IMAP, respectively, whereas 23 and 25 are telnet and SMTP. Finally, ports 80 and 443 are HTTP and HTTPS.
726102-5001Which of the following commands will enumerate the hosts database? getent hosts gethosts nslookup hostThe getent command is used for working with NSS databases, and getent hosts will display the available hosts using the databases configured in /etc/nsswitch.conf.
727102-5004Which of the following netmasks is used for a subnet described with a /25 in CIDR notation? 255.255.255.0 255.255.0.0 255.255.255.192 255.255.255.128A /25 in CIDR notation represents half of a /24 in address space, therefore making 255.255.255.128 the masked bits. The 255.255.255.0 option is /24, whereas 255.255.255.192 is a /26. Finally, 255.255.0.0 is a /16.
728102-5003Which of the following configuration lines will set the DNS server to 192.168.1.4 using /etc/resolv.conf? dns 192.168.1.4 dns-server 192.168.1.4 nameserver 192.168.1.4 name-server 192.168.1.4The configuration option is called nameserver, and the value for the option is the IP address of the desired name server. There are several options that affect how name resolution is performed, such as the number of attempts and timeout. Also, the order in which name servers appear affects in which order the name servers are queried. See resolv.conf(5)for more information.
729102-5004When examining open ports on the server, you see that TCP port 3000 is listed with no corresponding protocol name, such as SMTP, IMAP over SSL (IMAPS), and so on. In which file would you find a list of port-to-protocol translations that could be customized to add this new port? /etc/ports /etc/p2p /etc/ppp /etc/servicesThe /etc/services file contains standard port-to-protocol information based on the well-known and assigned ports from the Internet Assigned Numbers Authority (IANA). If youd like to provide a custom name for the service, you can do so by editing this file. There is no /etc/ports or /etc/p2p file by default, and /etc/ppp is usually a directory for the Point-to-Point protocol daemon and related services.
730102-5001Which of the following commands adds a route to the server for the network 192.168.51.0/24 through its gateway of 192.168.51.1? route add -net 192.168.51.0 netmask 255.255.255.0 gw 192.168.51.1 route add -net 192.168.51/24 gw 192.168.1.51 route -net 192.168.51.0/24 192.168.51.1 route add 192.168.51.1 -n 192.168.51.0//255.255.255.0The route command can be used for this purpose, and the syntax includes the network range, denoted with the -net option, followed by the word netmask and the masked bits, followed by the lettersgw and the IP of the gateway. The other options shown are invalid for a variety of reasons, including missing keywords and options and order.
731102-5003Which of the following netstat options displays the send and receive queues for each socket? -r -M -a -vThe -a option displays statistics for each socket, both listening and non-listening. Included in this information is the send and receive queues. This information can be used to gauge performance and potential bottlenecks.
732102-5001Which of the following represents a correct configuration line for /etc/hosts? 192.168.1.4 cwa.braingia.org cwa cwa.braingia.org cwa 192.168.1.4 cwa.braingia.org 192.168.1.8 alias cwa alias cwa.braingia.org cwa 192.168.1.4The correct format is the IP address followed by canonical hostname followed by any aliases for the host. You can use entries in /etc/hosts to override DNS lookups, which can be useful to prevent those names from resolving or to provide a different resolution.
733102-5003Which of the following commands configures the eth0 device with an IP address of 192.168.1.1 in a /24 network? ifconfig eth0 192.168.1.1/24 ifconfig eth0 192.168.1.1/255.255.255.0 ifconfig eth0 192.168.1.1 netmask 255.255.255.0 ifconfig 192.168.1.1 netmask 255.255.255.0 eth0The ifconfig command for configuring interfaces begins with the device followed by the IP address, which is then followed by the netmask keyword and the netmask you want to add. Because this is a /24, the netmask is 255.255.255.0.
734102-5003Which of the following describes a primary difference between IPv4 and IPv6? IPv4 is for internal networks only, whereas IPv6 is for public networks. IPv4 is for public networks, whereas IPv6 is for internal networks. IPv4 uses a 32-bit address, whereas IPv6 uses a 128-bit address. With IPv6, no subnetting is necessary.IPv4 addresses are 32 bits in length and IPv6 addresses are 128-bits. Both IPv4 and IPv6 can be used on internal and external networks alike, and subnetting is indeed necessary with IPv6.
735102-5004On which port does ICMP operate? TCP/43 UDP/111 UDP/69 ICMP does not use ports.ICMP is a layer 3 protocol, meaning that it does not use ports for communication. TCP/43 is used for whois whereas port 111 is used for sunrpc. UDP/69 is used for the TFTP protocol.
736102-5002Which of the following commands will change the default gateway to 192.168.1.1 using eth0? ip route default gw 192.168.1.1 ip route change default via 192.168.1.1 dev eth0 ip route default gw update 192.168.1.1 ip route update default 192.168.1.1 eth0The ip route command can be used for this purpose, and its syntax uses a change command and the via keyword. The same operation could be completed with the route command but would require deleting the existing gateway first and then re-adding a new default gateway.
737102-5003Which of the following ports is used for Secure Shell communication? TCP/23 TCP/25 TCP/22 TCP/2200Secure Shell (SSH) operates on TCP port 22 by default. TCP/23 is used for telnet, TCP/25 is used for SMTP, and TCP/2200 is not associated with a well-known service.
738102-5002Which options for netcat will create a server listening on port 8080? netcat -p 8080 nc -l -p 8080 nc -p 8080 nc -s 8080The nc command is used to start netcat and the -l option causes it to listen. The -p option is used to specify the port on which netcat will listen. The -s option specifies the local source address and is not used for this scenario.
739102-5001Which of the following commands displays the Start of Authority information for the domain example.com? dig example.com soa dig example.com authority dig example.com -auth dig -t auth example.comThe soa type is used to query for Start of Authority records for a domain. Note that in many cases, dig will attempt to look up the domain within a given command and may not appear to have had an error. For example, when running option D (dig -t auth example.com) you will receive information about example.com and there will be a line in the output that dig has ignored the invalid type of auth.
740102-5001Assume that you want to enable local client services to go to hosts on the network without needing to fully qualify the name by adding the domain for either example.com or example.org. Which option in /etc/resolv.conf will provide this functionality? search domain local-domain local-orderThe search option is used for this purpose and can be provided with multiple domain names, each separated by a space or tab. The domain option is valid within /etc/resolv.conf but does not allow for multiple domain names. On newer systems, systemd-resolved has taken over for the /etc/resolv.conf file.
741102-5003Which of the following commands sends an IPv6 ping to a unique local address? ping -6 127.0.0.1 ping6 fddi/128 ping6 fdd6:551:b09f:: ping -6 fdd6:551:b09f::The ping6 command is used to ping IPv6 addresses. Unique local addresses are the IPv6 equivalent of RFC 1918 private addresses in IPv4. In IPv6, fc00::/7 is the unique local address space. Note that there is no -6 option to the normal ping command.
742102-5001Which of the following commands prevents traffic from reaching the host 192.168.1.3? route add -host 192.168.1.3 reject route -nullroute 192.168.1.3 route add -null 192.168.1.3 route add -block 192.168.1.3The route command can be used for this purpose, and in the scenario described, a reject destination is used for the route. The other options shown are incorrect because they use invalid options to the route command.
743102-5002Which of the following describes a primary difference between traceroute and tracepath? The traceroute command requires root privileges. The tracepath command provides the MTU for each hop, whereas traceroute does not. The tracepath command cannot be used for tracing a path on an external network. The traceroute command is not compatible with IPv6.The tracepath command provides the maximum transmission unit (MTU) of the hops where possible. Both traceroute and tracepath can be used internally or externally, and both provide IPv6 capabilities, though traceroute6 and tracepath6 provide IPv6 capabilities as well. Certain options with the traceroute command can require root privileges, but not enough information was given in the question for that to have been the correct option.
744102-5004Which of the following commands will emulate the ping command in Microsoft Windows, where the ping is sent for four packets and then the command exits?ping -n 4 ping -t 4 ping -p 4 ping -c 4The -c option provides the count of the number of pings to send. The -n option specifies numeric output only, whereas -p specifies the pattern to use for the packet content. Finally, the -t option sets the TTL.
745102-5001Which command provides an interface into NetworkManager that works from a terminal window? nmcli nmui nm nmanThe nmcli command provides a command-line interface suitable for working with NetworkManager through a terminal or SSH connection. The nmtui command provides a curses-based interface that also works through a terminal or SSH connection.
746102-5001Which of the following commands configures eth1 with an additional IPv6 address of fdd6:551:b09e::? ifconfig eth1 inet6 add fdd6:551:b09e::/128 ifconfig add fdd6:551:b09e:: ifconfig fdd6:551:b09e:: eth1 ifconfig eth1 fdd6:551:b09eThe syntax for ifconfig uses the device—in this case followed by the protocol inet6— and then the keyword add to indicate that an additional IP address is being added, followed finally by the address itself.
747102-5003On which port does LDAP over SSL operate? Port 53 Port 389 Port 636 Port 443LDAP over SSL, or LDAPS, operates on port 636. Port 53 is used for DNS, port 389 is used for normal, non-SSL LDAP, and port 443 is used for HTTP over SSL.
748102-5004You need to prevent local clients from going to a certain host, www.example.com, and instead redirect them to localhost. Which of the following is a method to override DNS lookups for the specified host? Add a firewall entry for the IP address of www.example.com to prevent traffic from passing through it. Delete www.example.com from the route table using the route command. Add a null route to prevent access to the IP address for www.example.com. Add an entry for www.example.com in /etc/hosts to point to 127.0.0.1.The best option for this question is to add an entry for the host in /etc/hosts. Doing so will always cause DNS queries to resolve to 127.0.0.1. The other options are not as robust because they rely on www.example.com always having the same IP address, or the solutions require additional maintenance to constantly add new IP addresses if www.example.coms IP address changes.
749102-5001Which of the following commands should be executed after running ip route change? ip route flush cache ip route reload ip route cache reload ip route restartThe ip route flush cache command should be executed after changing the routes. The other commands shown for this question are not valid.
750102-5001Which option should be used to send a DNS query for a Sender Policy Framework (SPF) record with dig? -t txt -t spf -t mx -t mailspfSPF records are stored in the txt record type in DNS, making -t txt the correct option for this. Of the other options, only -t mx is valid and returns the mail exchangers for the given domain.
751102-5002Which of the following protocols uses a three-way handshake? ICMP TCP UDP IPTCP is a connection-oriented protocol that uses a three-way handshake to establish a connection. ICMP does not use ports for communication, and UDP is connectionless. IP is the core Internet Protocol and does not use a handshake.
752102-5004How many IP addresses are available in the 172.16.0.0 private range in IPv4? /32 16777216655361048576There are 1,048,576 IP addresses in the 172.16.0.0 private range. There are 16,777,216 in the 10.0.0.0 range and 65,536 in the 192.168.0.0 range.
753102-5003When troubleshooting a connectivity issue, you have found that you can reach a server via the web but cannot ping it. Which of the following best describes a possible cause for this scenario? TCP traffic has been blocked at the firewall. The DNS lookup is failing. ICMP traffic has been blocked. There is a reject route in place.The only viable possibility of those listed is that ICMP traffic is blocked. TCP traffic is obviously passing because of the ability to get there using HTTP, and DNS must also be working.
754102-5003When viewing the available routes using the route command, one route contains UG flags and the others contain U flags. What do the letters UG signify in the route table? The G signifies that the route is good. The G signifies that the route is unavailable. The G signifies that this is a gateway. The G signifies that the route is an aggregate.The G signifies a gateway within the route table.
755102-5001Which of the following commands requests a zone transfer of example.org from the server at 192.168.1.4? dig example.org @192.168.1.4 axfr dig example.org @192.168.1.4 dig example.org @192.168.1.4 xfer dig example.org #192.168.1.4 xferThe axfr type is a zone transfer, and the @ symbol signifies the server to which the query will be sent. There is no xfer type, and option B is just a normal query for the domain sent to the specified server.
756102-5004Which of the following commands displays the number of packets forwarded by the kernel? ls ipstat ifconfig -a netstat -sThe netstat -s command displays aggregate statistical information for networking, including the total packets received and the number of packets forwarded. The ifconfig command does not show packets forwarded. The ls command is not used for networking, and the ipstat command does not exist.
757102-5003When using the ip command, which protocol family is used as the default if not otherwise specified? tcpip ip inet arpThe ip command defaults to the inet family if not otherwise specified with the -f option. The command will attempt to guess the correct family and fall back to inet. The other families listed as options for this command are not valid for use with the ip command.
758102-5002Which of the following commands changes the Media Access Control (MAC) address of eth0? ifmac eth0 ifconfig eth0 hw ether ifconfig eth0 mac ifconfig eth0 hw macThe ifconfig command will be used for this purpose, followed by the interface. The hw keyword is used for the hardware address, which is then followed by the hardware class, in this case ether. That is followed by the new MAC address (not depicted in the options). The other commands are not valid.
759102-5004You are using the route command to view routes. However, name resolution is taking a long time and causing delay in the response from the route command. Which option to route can be added to cause it to not perform name resolution? -d -e -f -nThe -n option causes route to use numeric values only, performing no name resolution. This option is useful for the scenario described. The -e option causes the output to be in netstat format. There is no -d or -f option for the route command.
760102-5001You have replaced a device on the network but used the IP from another active device. Which command can be run to remove the MAC address entry from your computer so that it performs the address resolution again? arp -d netstat -rn hostname digBecause were working with MAC addresses, the arp command will be used. The -d option removes or deletes an Address Resolution Protocol (ARP) entry, which would be appropriate here so that the MAC address resolution occurs again. The netstat command will not be used for this purpose. The hostname and dig commands work with name resolution but not for MAC addresses or the ARP table.
761102-5001Which of the following commands displays information such as link status about the wireless device wlan0? iw dev wlan0 link wlan0 list iw wlan0 -l iw dev linkThe iw command will be used for this purpose. When using iw with a specific device, the dev keyword appears next, followed by the device name and then the command you want to execute on that device. In this case, the link command is used.
762102-5002Which command is used for setting parameters such as the essid, channel, and other related options for a wireless device? ifconfig iwconfig wlancfg iconfThe iwconfig command, which is similar to the ifconfig command, works with an individual wireless interface to set and display parameters. Of the other commands, the ifconfig command is valid but not used for wireless. The other commands are not valid.
763102-5003Which of the following commands can be used to scan for available wireless networks? iwlist get iwconfig scan iwlist scan iw-scanThe iwlist command will be used for this purpose, and the scan subcommand is used to look for local access points and wireless networks. Superuser privileges are required for a full scan. The iwconfig command does not have a scan subcommand. Likewise, there is no subcommand called get for the iwlist command, and there is no iw-scan command.
764102-5002You need to offer internally facing NTP services. On which protocol and port does NTP listen? TCP/20 and TCP/21 UDP/123 TCP/139 UDP/5150NTP listens on UDP port 123 by default. Ports 20 and 21 are used for FTP services, port 139 is used by NetBIOS, and port 5150 is not usually used.
765102-5002You need to set the MTU to a specific value for a network interface. Which option to ifconfig facilitates this? -mtu mtu metric addrmtuThe mtu can be used to set the value for the maximum transmission unit (MTU) for a given interface. The metric option sets the interface metric. The other options are not valid.
766102-5001Which option to the arp command creates a new entry for a given IP address-to-MAC address pair? -s -c -d --addThe -s option creates an ARP table entry. The -d option removes an entry. The -c and --add options do not exist.
767102-5001Which of the following commands shows network sockets and their allocated memory? ss -m mpas mem freeThe ss command provides many of the same functions as netstat but can show some extended information, such as memory allocation for a given socket. The free command shows memory usage but not by socket, and the other two commands do not exist.
768102-5004When troubleshooting a potential hardware problem, you need to determine which physical interface is being used for a certain address. One way to accomplish this is with the ping command in order to monitor the activity lights on the device. Which of the following options to ping will flood the interface with ECHO_REQUEST packets? -e -a -c -fThe -f option is a flood ping. This will effectively cause the interface to send and receive large amounts of traffic, usually making it easier to find on a switch. The -a option is an audible ping, emitting a sound on ping. The -c option sends a certain count of pings, and there is no -e option.
769102-5002Which of the following commands can be used to test network connectivity at the TCP level instead of telnet? netstat nc nettest pingThe netcat command provides a method for opening and communicating on both sides, server and client, for a TCP connection. The netcat command avoids some of the issues with telnet capturing characters specific to the Telnet protocol. The netstat command does not test connectivity, and ping does not do so at the TCP level. There is no nettest command.
770102-5003Which option to tcpdump displays a list of available interfaces on which tcpdump can operate? -a -d -D -iThe -D option lists the interfaces on a given computer. The -d option dumps compiled matching code, and -i selects an interface. There is no -a option.
771102-5001Which command provides a method for sending ICMP requests for IPv6? ping6 pingv6 tracert 6pingThe ping6 command performs the same as the IPv4 ping command but does so for IPv6. The other commands are not valid on Linux.
772102-5002Which of the following commands displays information about addresses, specifically only IPv6 addresses, currently in use on the computer? ip addr ip -6 addr ip6add ipv6addrThe ip command can be used for this purpose. When using it with the addr object and the -6 option, only information about IPv6 addresses will be shown. The first option, simply ip addr, will show all addresses, including IPv4. The other commands are not valid.
773102-5001Which of the following commands will disable ARP on the interface eth0? ifconfig eth0 -arp ip eth0 noarp ifconfig eth0 noarp if eth0 disable arpThe ifconfig command will be used for this purpose, and ARP can be disabled by preceding the word arp with a minus sign, as shown. If no minus sign is present, then ARP will be enabled. The other commands will not work for this scenario.
774102-5003Which option to the route command forces the kernel to use the specified device for the route rather than attempting to determine the correct device? inet addr dev deviceThe dev option specifies the device to use for the route being specified. This is a typical use case for many routes to reduce the chance of the kernel guessing incorrectly. The other options shown for this question are not valid.
775102-5003Which option to the ss command shows the process IDs associated with the socket? -l -a -p -fThe -p option shows the process IDs associated with a given socket within the ss output. The -a option is all sockets, whereas -l is listening sockets. The -f option is used to specify the protocol family.
776102-5003Which option to traceroute causes the command to use ICMP for requests? -T -A -I -iThe -I option tells traceroute to use ICMP for requests. The -T option is TCP SYN. The -A option performs AS path lookups, and the -i option configures traceroute to use the specified interface.
777102-5003Which programmatic function is used by the hostname command internally? getaddr gethost gethostname getnameInternally, the hostname command uses gethostname. This can be useful to know when troubleshooting address resolution issues such as conflicting results for host naming. The other functions are not valid.
778102-5001Which of the following commands will examine the system log for information regarding DHCP activity? grep -i dhcp /var/log/syslog grep -v dhcp /var/log/syslog grep -vi dhcp /var/log/kern.log dmesg | grep dhcpThe grep command used with the -i option makes the grep case insensitive. When used with the -v option, grep will exclude the argument, thus doing the opposite of whats needed here. The kernel ring buffer will probably not contain information about DHCP, making dmesg an incorrect option.
779102-5002Which of the following characters are valid for hostnames in /etc/hosts? Alphanumerics, minus, underscore, and dot Alphanumerics, minus, and dot Alphanumerics and dot AlphanumericsOnly alphanumerics, minus/dash, and dot are valid for hosts in /etc/hosts.
780102-5002Which of the following configuration lines in /etc/resolv.conf enables debugging? debug options debug option debug enable-debugOptions within /etc/resolv.conf are preceded with the options keyword followed by one or more options, such as debug.
781102-5004Which of the following commands views systemd journal entries for the NetworkManager unit? systemd NetworkManager systemd NetworkCtl systemctl NetworkManager journalctl -u NetworkManagerThe journalctl command will be used for this purpose. Adding the -u option specifies the unit for which journal entries are desired.
782102-5001Which file is read at boot to set the local computers hostname? /etc/hostname /etc/hosts /etc/localhost /etc/networkhostThe /etc/hostname file typically contains only the hostname of the local computer rather than the hostname and domain name. This is then read at boot time to set the hostname for the computer. The /etc/hosts file contains information on various hosts for name resolution purposes. The other files do not exist.
783102-5002Which traceroute command is used exclusively for IPv6 route traces? trace6 traceroute6 tracert6 6traceThe traceroute6 command is used for tracing IPv6 routes. The other commands do not exist.
784102-5004Which type can be used with the dig command to test a zone transfer? xfr transfer zxfr axfrThe axfr type can be used with dig to request a zone transfer. The client from which you request the zone transfer will need to be authorized to initiate a transfer.
785102-5001Which option to the host command sets the query type to ANY? -a -b -c -dSetting -a as an option to the host command sets the query type to ANY. The -c option sets the class, and -d turns on debugging. There is no -b option.
786102-5003Within which file can per-user default settings be created for the dig command? /etc/dig.cfg /etc/dig.conf ~/.digrc ~/.dig.confThe .digrc file, when created in a users home directory, can be used to set defaults for use of the dig command. There is no dig configuration file found in /etc.
787102-5004Which type of DNS record is used for specifying a POP3 server? POP PO MX There is no specific type for POP3 servers.POP3 servers do not have a specific type in DNS. MX type indicates mail exchanger, or SMTP server.
788102-5001Which of the following iproute2 commands changes the address of device eth0 to 192.168.1.1 with netmask 255.255.255.0? ip addr add 192.168.1.1/24 dev eth0 ip addr eth0 192.168.1.1 255.255.255.0 ip addr dev eth0 192.168.1.1 255.255.255.0 ip addr 192.168.1.1/255.255.255.0 eth0The ip addr add command is used to add IP addresses to interfaces using the syntax shown in option A. The other options do not have the correct syntax.
789102-5002Which command is used to show the settings for DNS resolution with systemd-resolved? systemctl resolvers resolvectl status systemctl --resolvers resolvectl --view-statusThe resolvectl command is used for assistance with resolution issues for systemd-resolved and, when given the status command, will return the DNS settings. The other options shown do not exist. The resolvectl command is somewhat new, and if its not yet available on a given systemd-based distribution, then systemd-resolve --status can be used.
790102-5001Which of the following commands enables NetworkManager so that it can be used to configure Ethernet and Wi-Fi network devices? nmcli networking on netman enable NetworkManager --enable nmti --enable networkingThe nmcli command is the only valid NetworkManager command shown as an option, and when given the networking on command, NetworkManager will control the network interfaces. It is worth noting that if you disable NetworkManager control with networking off then all of the previously managed interfaces are disabled.
791102-5002You are troubleshooting a DNS problem using the dig command and receive a status: NXDOMAIN message. Which of the following best describes what NXDOMAIN means? NXDOMAIN means that you have received a nonauthoritative answer for the query. NXDOMAIN means that the domain or host is not found. NXDOMAIN indicates a successful query. NXDOMAIN signifies a new domain record has been added.NXDOMAIN is the status for a nonexistent domain or host, basically that the host for which the query was sent does not exist. A normal status when there has not been an error is NOERROR.
792102-5003Which systemd daemon can be used to manage network interfaces through systemd? networker networked networkd netwrkdThe systemd-networkd daemon can be used to manage networking through systemd. The other options shown are not valid.
793102-5002Which command for hostnamectl can be used to set the hostname? set-host set-hostname set-name hostnameThe set-hostname command within hostnamectl sets the hostname of the device. The other commands shown are not valid for use with hostnamectl.
794102-5001On which port does IMAP over SSL (IMAPS) listen? 993995465514IMAPS uses port 993 by default, as defined by IANA. Port 995 is POP3S, port 465 is SMTPS, and port 514 is used by syslog.
795102-5002When youre looking to parse the output of the ip command, which option can you set to remove newlines so that the output can be piped to the grep command? -n -o -l -fThe -o option removes newlines from the output, making the output more suitable for the grep command. The -l option specifies the number of loops for the ip addr flush command, the -f option specifies the protocol family, and there is no -n option.
796102-5001You need to temporarily prevent users from logging in to the system using ssh or another means. Which of the following describes one method for accomplishing this task? touch /etc/nologin Disable sshd. Remove /etc/login. Add a shadow file.If /etc/nologin exists, users will be prevented from logging in to the system. The root user can still log in, assuming that root logins are enabled within the ssh configuration.
797102-5002Which of the following commands searches the entire filesystem for files with the setuid bit set? find ./ -perm suid find / -perm 4000 find / -type suid find / -type f -perm setuidThe find command will be used for this purpose, and the permission can be described as 4000 to indicate the presence of the setuid bit. The -type option can be used to change the type of object to be returned but is not relevant for the scenario described.
798102-5002Which of the following commands displays the currently open ports and the process that is using the port? netstat -a lsof -i ps auwx netlistThe lsof command can be used for this purpose and, with the -i option, will display the network ports along with their process. The netstat command, when run with the -a option, will display network ports but not the process. The ps command is used for processes but not network ports. Finally, there is no netlist command.
799102-5001You are attempting to unmount a filesystem using the umount command. However, when you do so you receive a message indicating that the filesystem is in use. Which of the following commands can be used determine which process is keeping a filesystem open?fuser ls find psThe fuser command can be used to determine which process is using a given file. The ls command will show files and find can be used to find files but not specifically for this purpose. The ps command does show processes but not necessarily ones tied to a particular file.
800102-5004Which of the following commands displays account information such as expiration date, last password change, and other related details? usermod -l userinfo -a chageuser -l chage -lThe chage command is used for working with account aging information such as expiration date, password change, days between password changes, and so on. The -l command lists information for the given account. The usermod command is used to make changes to an account, and the other two commands are not valid.
801102-5001Which of the following commands scans the IP address 192.168.1.154 for open ports? nmap 192.168.1.154 lsof 192.168.1.154 netstat 192.168.1.154 netmap 192.168.1.154The nmap command is used to scan for open ports. By default, the nmap command will scan for open TCP ports to the address or addresses specified. The other commands shown do not scan for open ports to external (off-host) IP addresses.
802102-5002Which command is used to create a public/private key pair for use with ssh? ssh -k ssh-keygen ssh-genkey ssh -keyThe ssh-keygen command is used to create a key pair for use with ssh instead of a password. Of the other options, the ssh command does exist but the -k option is used to disable Generic Security Service Application Program Interface (GSSAPI) credential forwarding and not for the purpose described.
803102-5002Which of the following configuration options sets a hard limit of 25 processes for a user called suehring in /etc/security/limits.conf? suehring hard proc 25 suehring hard nproc 25 suehring proc 25 hard-limit proc 25 suehring hardThe format is username (or other specifier) followed by hard or soft, depending on the limit type, then the keyword followed by the value for that given keyword.
804102-5001Within which file should you place public keys for servers from which you will accept key-based ssh authentication? ~/.ssh/authorized_keys ~/.ssh/keys ~/.ssh/keyauth ~/.sshd/authkeysThe authorized_keys file, stored in the .ssh directory in your home directory, contains public keys that are authorized to log in to the server using their corresponding private key.
805102-5003The system on which you are working does not have the lsof command installed, and you are not allowed to install software without going through four levels of approval and scheduling the installation weeks in advance. However, the netstat command is available. Which option to netstat will show the process ID to which a given network port is connected? -a -n -p -lThe -p option shows the process ID to which a given port is connected and is useful for displaying information about which process is listening on a given port. The -a option shows listening and nonlistening sockets whereas -n disables name lookups. The -l option shows listening sockets only.
806102-5004You need to look at information on logins beyond that which is captured by the current log file for the last command. Which option to the last command can be used to load information from an alternate file? -a -t -e -fLoading alternate files is accomplished using the -f option. Doing so facilitates exactly the scenario described, being able to examine logins from old log files. The -a option controls the location of the display for the host, whereas -t controls the display to output the logins as of the specified date and time. There is no -e option.
807102-5004You need to examine who is currently logged in to the system. Which of the following commands will display this information? listuser fuser ls -u wThe w command shows currently logged-in users along with information such as uptime and load average. The fuser command is used to show open files, and the -u option to ls controls the display for file listings. There is no listuser command.
808102-5001You need to execute a command as a specific user. Which of the following commands enables this to occur? sudo -u sudo -U sudo -s sudo -HThe -u option is correct for this purpose. An uppercase -U option sets the user context for listing privileges. The -s option sets the shell, and the -H option sets the home directory.
809102-5002Which option in /etc/sudoers will cause the specified command to not prompt for a password? PASSWORD=NO NOPASSWD NOPASSWORD NOPROMPTThe NOPASSWD option causes sudo to not prompt for a password for a given sudo command. This is useful for scripted scenarios where a password prompt would cause problems.
810102-5003Which of the following commands will display the CPU time, memory, and other limits for the currently logged-in user? reslimit limitres -a ulimit -a proclimit -nThe ulimit command shows such limits, and the -a option shows all limits for the currently logged-in user. The other commands are not valid.
811102-5003Which line in the /etc/hosts.deny file will prevent any host within the 192.168.1.0/24 network from accessing services that operate from xinetd? BLOCK: 192.168.1.0/24 REJECT: 192.168.1.0 ALL: 192.168.1.0/255.255.255.0 NONE: 192.168.1/255.255.255.0The syntax to block access to every service uses the ALL keyword followed by the address or network to which the policy will apply.
812102-5001When expiring a user account with usermod -e, which of the following represents the correct date format? YYYY-MM-DD MM/DD/YYYY DD/MM/YY MM/DD/YY HH:MM:SSThe correct format is YYYY-MM-DD for the usermod command.
813102-5003Which of the following directives in a configuration file found within /etc/xinetd.d will prevent the service from starting? enable no start no disable yes boot noThe disable option is used for the purpose described, and can be set to yes or no. The other options are not valid for this scenario.
814102-5001You are using an RSA-based key pair for SSH. By default, what is the name of the private key file in ~/.ssh? id_rsa id_rsa.priv id_rsa.key rsa_key.privThe file is named id_rsa by default, and the public key is named id_rsa.pub. For DSA keys, the names are id_dsa and id_dsa.pub. Other key names such as id_ecdsa, id_ ecdsa.pub, id_ed25519, and id_ed25519.pub are also used depending on the algorithm. For client keys, these are typically stored in ~/.ssh/ by default.
815102-5003Which option to the su command will execute a single command with a noninteractive session? -s -u -c -eThe -c option executes a single command but does so without an interactive session. The -s option specifies the shell to be used. There is no -u or -e option for the su command.
816102-5001Which file is used to enable the setting of limits for things like logins, processes, memory, and the like for users? /etc/security/limits.conf /etc/userlimits.conf /etc/security/userlimits.conf /etc/security/procmem.confThe /etc/security/limits.conf file (on some Linux distributions this file could be /etc/limits.conf) enables the setting of limits for user logins, processes, memory usage, and other resources. The other files shown do not exist by default.
817102-5002Which of the following best describes the method to use with ssh in order to execute a single command on a remote server? Use the -e option followed by the command. Send the command after the other options as part of the command line. Use the --execute option followed by the command. Use the -s option followed by the command.There is no special option necessary in order to execute a single command on a remote host with ssh, although you might sometimes place the command in quotes if spaces are included. The -s option requests a subsystem and is not related to this scenario. The -e option specifies an escape character.
818102-5004When youre using ssh-agent, which command and option lists the currently loaded keys? ssh-agent -l ssh -l ssh-list-keys ssh-add -lThe ssh-add command is used to list currently loaded keys and is used in conjunction with ssh-agent. There is no -l option to ssh-agent, and the -l option to ssh specifies the login name to use. There is no ssh-list-keys command.
819102-5003Which of the following commands should be used to edit the /etc/sudoers file? Any text editor such as vi or emacs editsudo visudo visudoersWhile any text editor can be used, it is highly recommended that you use the visudo command to edit /etc/sudoers. Using visudo enables syntax checking, which will help to prevent issues with an invalid configuration, causing problems for those who rely on sudo.
820102-5001Which of the following commands can be used to stop a given service, such as httpd.service, from starting on boot with a systemd-based system? systemctl disable httpdservice systemctl stop httpd.service systemd disable httpd.service systemd enable httpd.service boot=noThe systemctl command will be used for this purpose, and the subcommand is disable. There is a stop subcommand, but it will only stop the given service rather than prevent it from starting on boot. The other options are invalid for various reasons, including that they use systemd as the command name rather than systemctl.
821102-5002Which of the following commands will set an account to expire based on the number of days elapsed since January 1, 1970? passwd -e chage -E usermod -l chguserThe chage command can be used for this purpose, and the -E option accepts days since 1/1/1970. There is no -e option to passwd, and -l for usermod will not perform the action described. There is no chguser command.
822102-5003You need to specify a list of known hosts for SSH for certain hosts within your organization rather than each user needing to accept those keys individually. Which option within a server-wide SSH client configuration file enables this scenario?KnownHosts PerMachineKnownHosts GlobalKnownHostsFile ServerKnownHostsFileThe GlobalKnownHostsFile configuration option enables the specification of a server-wide known hosts file, thus preventing users from needing to accept host keys for the hosts specified therein.
823102-5003Which option within /etc/security/limits.conf is used to control the number of times that a given account can log in simultaneously? nlogins loginmax maxlogins loginlimitThe maxlogins parameter is used to control the number of simultaneous logins for a given account.
824102-5002Which file can be used to store a server-wide cache of hosts whose keys are known for ssh? /etc/sshd_known_hosts /etc/ssh_known_hosts ~/.ssh/known_hosts /root/ssh_known_hostsThe ssh_known_hosts file, typically kept in /etc/, is used for the purpose described. Note that on some systems, this file and other SSH-related configurations may be found in /etc/ssh/. The options that indicated ~ or within /root are incorrect because the question specified a server-wide list.
825102-5003Within the following entry in /etc/shadow, to what does the number 15853 refer? mail:*:15853:0:99999:7::: The UID of the mail user The number of files owned by mail The date of the last password change (since 1/1/1970) The number of days until the account expiresThe date of the last password change, as measured in days since January 1, 1970, is contained in the third field of a shadow entry. The expiration date would be the 8th field, as separated by colons.
826102-5001Which of the following commands sets up a local port-forwarding session on local port 5150 to remote port 80 of www.example.com? ssh -L 5150:www.example.com:80 ssh 5150:www.example.com ssh -p 5150 www.example.com ssh -e 5150 www.example.com:80The format for local forwarding uses the -L option followed by the local port and then the remote host:port combination. This is typically followed by the user@host credential and destination information for the SSH connection itself.
827102-5003Which option must be enabled in /etc/sshd_config on the destination server in order for X11 forwarding to work? XForward yes Xenable yes X11Forwarding yes Xconnection yesThe option is called X11Forwarding and it must be set to yes in order for the destination server to forward X-based windows to the local client computer. The other options shown are not valid.
828102-5001Which of the following commands generates a GnuPG key pair? gpg --gen-key gpg --key gpg --send-key gpg --create-keyThe --gen-key subcommand is used for the purpose described. The other options shown do not exist.
829102-5001Signatures with gpg can be generated by using which option on the gpg command line? --sign --signature --si --dsignThe --sign option is used to sign files and documents with gpg. The other options shown are not valid for signatures.
830102-5001Which option to ssh is used to set the port for the remote host? -p -P -l @The -p option sets the port for login and is useful for scenarios where you cannot use the host:port syntax. There is no -P or @ option with ssh, and the -l option specifies the login name.
831102-5001Which option to nmap sets the scan to use TCP SYN packets for finding open ports? -sS -sT -sY -type SYNThe -s option sets the type of scan and, when followed by an uppercase S, sets the option to SYN. The T option is a Connect() scan. There is no Y or -type option for nmap.
832102-5003Which of the following logs is used by the last command for detailing recent logins? /var/log/last /var/log/all.log /var/log/wtmp /var/log/loginsThe wtmp file, stored in /var/log, is used to store recent login information and must be read with the last command due to its format. The other logs listed for this question are not default logs found on a Linux system.
833102-5001Which option to ssh enables the use of a key for authentication? -i -k -f --keyThe -i option for ssh is followed by the private key to use for authentication. Doing so implies that the public key is in the authorized_keys file on the remote host. The -k option disables sending of GSSAPI credentials, whereas -f is used to request backgrounding of ssh. There is no --key option.
834102-5001In a scripting scenario, you need to prevent sudo from prompting for credentials or for any other reason. Which option to sudo is used to indicate this? -n --noprompt -i -qThe -n option facilitates the scenario described and will exit non-zero rather than prompting. The -i option sets the login name and is not valid for this scenario. The -q and the --noprompt options do not exist.
835102-5003Which of the following commands generates an RSA key for use with ssh? ssh -key rsa ssh --gen-key rsa ssh-keygen -t rsa ssh-keygen rsaThe ssh-keygen command will be used for this purpose, and the -t option specifies the type of key to generate. There are no key-related generation options for the ssh command.
836102-5002You need to disable a service found in /etc/inetd.conf. Which of the following is used as a comment character in that file? - # / %Lines can be commented out of /etc/inetd.conf with a pound sign or hash mark (#). After making changes to /etc/inetd.conf, the service should be restarted.
837102-5001Which of the following commands can be used to lock an account? usermod -L usermod -l passwdlock lockacctThe -L option to usermod can be used to lock an account. The lowercase version, -l, is used to change a username. The other commands do not exist.
838102-5002Which file is used as the default storage for public keyrings for gpg? publickeys.gpg pubring.gpg public.gpg pubkeys.gpgThe pubring.gpg file, found in ~/.gnupg/, contains the public keyring.
839102-5003Which file in ~/.gnupg/, if present, indicates that files have been migrated to gpg version 2.1 or later? .gpg-v21 .gpg-updated .gpg-v21-migrated .gpg-files-v21The .gpg-v21-migrated file, when present, indicates that gpg version 2.1 or later is in use and that the files have been migrated for that version or a later one.
840102-5004Which of the following commands searches a server for files with the setgid bit enabled? find / -perm 4000 find ./ -perm setgid grep setgid * find / -perm 2000The find command will be used for this purpose, and the -perm option is needed, specifically as the 2000 permission to indicate setgid. Note the use of / to indicate that the entire server will be searched. The grep command shown cannot be used for this purpose because it looks for the presence of the string 'setgid' within files located in the current directory only.
841102-5003Which of the following commands creates links within /etc/rc.d/* for starting and stop- ping services on a Debian system? createsym startstop-service update-rc.d createconfigThe update-rc.d command creates symbolic links from a service file in /etc/init.d/ to the appropriate locations in /etc/rc.d/* for each runlevel. The other commands shown are not valid.
842102-5001Which runlevel is typically used for single-user mode, as indicated in /etc/inittab? 1256Single-user mode is typically runlevel 1. In runlevel 1, no network services are started. Runlevel 2 has networking but typically not services. Runlevel 5 is full multiuser with networking, and runlevel 6 is reboot.
843102-5003Which option to the su command is used to obtain the normal login environment? -u -U - -loginThe - option is the typical option passed to su for login. There is no -u or -U option, and the -login option does not exist. There is a --login option with two dashes, but that is not whats shown.
844102-5001Which of the following commands shows network services or sockets that are currently listening along with sockets that are not listening? netstat -a netlink -a sockets -f opensock -lThe netstat command is used for this purpose, and the -a option displays all sockets, listening and nonlistening. Note that its frequently helpful to add the -n option, or combine them as in netstat an, in order to prevent name lookup. Doing so can significantly improve the performance of the command.
845102-5003Which of the following commands lists open files belonging to all processes except those owned by the user bind? lsof -i lsof -u bind lsof -u ^bind lsof | grep bindThis solution will require a way to filter out the bind user; therefore, options that grep for bind or specify bind as the user are incorrect. However, the lsof command allows for negation with the caret (^) character. Therefore, listing all files except bind requires the syntax shown.
846102-5002Which option to nmap will cause it to always perform name resolution? -n -R -b -aThe -R option requires an attempt at name resolution be performed. The -n option does the opposite; it disables name resolution. There is no -b or -a option.
847102-5003Which wildcard can be used in /etc/hosts.allow to specify a match for a host whose name does not match its IP address? * ALL PARANOID NAMEMATCHThe PARANOID wildcard specifies that the hostname and IP must match. The ALL keyword is also a valid wildcard in TCPWrappers for use in both /etc/hosts.allow and /etc/hosts.deny.
848102-5001Which of the following options within an OpenSSH server configuration is used to deter- mine whether the root user can log in directly with an SSH client? PermitRootLogin AllowRoot RootLogin PermitDirectRootLoginThe PermitRootLogin directive, set to yes or no, determines whether the root user can log in directly. The other options shown are not valid.
849102-5002Which of the following commands executes a port scan using TCP connect to the host" 192.168.2.3? portscan 192.168.2.3 nmap -sT 192.168.2.3 maphost 192.168.2.3 tcpscan -C 192.168.2.3The nmap command will be used for this purpose, and the -sT option performs a TCP connect to the specified host or network. The other commands are not valid.
850102-5003Which option to the ssh command is used for X11 application forwarding? -X11 -A -X -FThe -X option enables X11 application forwarding through an SSH connection. The -A option is used for authentication agent forwarding, and -F indicates a per-user configuration file. There is no -X11 option.
851102-5002Which option to gpg should be used in order to specify the destination for the encrypted file? --dest --output --destination --outThe --output option is used with --encrypt to send the output to a specified file. The other options shown are not valid for gpg.
852102-5002Which command is used to add keys to the SSH agent? ssh-keyadd ssh-add ssh-ed ssh-catThe ssh-add command adds keys to ssh-agent. The other commands shown are not valid.
853102-5002Which option to the passwd command sets the maximum password age until the password needs to be changed? -a -x -l -rThe -x option sets the maximum password age until the password needs to be changed again. The -l option locks the account, and the other options do not exist.
854102-5001Which option to the ulimit command enables setting of a limit on memory that can be locked? -l -x -b -tThe -l option sets the maximum amount of memory that can be locked. The -t option sets the maximum CPU time, and the -x and -b options do not exist.
855102-5002Which of the following commands prints a list of existing users from the password file? passwd --list cat /etc/passwd | cut -d':' -f1 grep "USERS" /etc/passwd lookup --userThe command shown to display the password file and pipe the output into cut will display the usernames from the password file, /etc/passwd. The /etc/shadow file would also produce the same output.
856102-5002You are defining a service in /etc/xinetd.conf. Which option is used to configure the times that access to the service is allowed? time_allowed access_times timed_access access_whenThe access_times configuration item sets the times in which access is allowed. The other configuration options shown are not valid.
857102-5001What file extension is used for interprocess communication service units that are controlled by systemd? .socket .ipc .comm .intercomThe .socket file extension is used for interprocess communication, network sockets, and first-in, first-out (FIFO) queues controlled by systemd. For more information, see systemd.socket.
858102-5003You are generating a host key for the SSH server with ssh-keygen and want to ensure that the key does not require a password when the SSH server starts. Which command-line option accomplishes this task? -p -P -N -dThe -N option provides the “new” passphrase, and when generating a key, it can be used to generate an empty password. The -p and -P options both work with passwords but would do so on an existing key. The -d option does not exist for ssh-keygen.
859102-5001When working with the /etc/shadow password file, you see passwords beginning with $1$. What algorithm does $1$ indicate has been used for password storage? MD5 Blowfish RIN PIKThe MD5 algorithm has been used if the password in /etc/shadow begins with $1$. Of the other options, shadowed passwords beginning with $2a$ or $2y$ would indicate the Blowfish algorithm. There is no RIN or PIK algorithm for shadow passwords.
860102-5002Which option to gpg creates a detached signature? --sig --detach-sig --det-sig --sgn-detThe --detach-sig option creates a detached signature file so that the original file remains unchanged. Both the original file and detached signature file are needed in order to verify the signature. The other options do not exist.
861102-5003Which of the following best describes the role of server host keys for SSH? The server host key is used to connect to remote servers. The server host key is used for encrypting SSL communications. The server host key is used for client connections and provides a means by which the client can verify that the server has not changed. The server host key provides secure DNS resolution.The server host key provides a means by which clients can verify that the server host key has not changed.
862102-5002When using a custom client configuration for SSH, which option specifies the key that will be used to connect to the host? KeyFile IdentityFile Key HostKeyThe IdentityFile option specifies the key that will be used to connect to the host. The other options do not exist for client configurations in SSH.
863102-5003Which of the following commands is used as a daemon process to manage private keys for GnuPG? gpgpkd gpg_pkd gpg-agent gpg-pkagentThe gpg-agent command is a daemon process to manage private keys. The gpg program and other GnuPG-related utilities use gpg-agent. The other options shown for this question are not valid.
864102-5004You need to enable editing of certain files with root privileges but do not want to grant sudo access to an editor such as vim due to the possibility of a shell escaping. Which command can be used in place of vim to provide privileged editing of files? suvim nano sudon sudoeditThe sudoedit editor, part of the sudo package, can be used for the purpose described. Of the other commands, only nano is a real command, but it would also present the same possibility of shell escapes as vim would in this scenario. While there may be ways to prevent a shell escaping with both vim and nano, sudoedit is typically the preferred option.
865102-5001Which option to the ssh command enables changing the login name for a given host? -l -u -a -mThe -l option changes the login name for a connection with ssh. Among the other options, only -a and -m exist and are not used for the purpose described.
866102-5001Which option to the usermod command changes a username? -l -u -a -mThe -l option for usermod changes the username. It is worth noting that the users home directory and mail spool file do not change and would need to manually be changed following the usermod command. The other options are not used for the purpose described.
867102-5003After specifying the key server, which option to gpg is used to specify the key to send to the key server? key-name keyname send-keys sendkeyThe send-keys option followed by the name of the key sends the key to the key server specified by the key server option. This is a typical scenario for sending a locally generated public key to a public server for others to use. The other options do not exist.
868102-5004Which of the following represents a group called admins within /etc/sudoers? @admins admins -admins %adminsThe % is used to denote a group within /etc/sudoers and provides an excellent way to facilitate an administrative privileged group.
869102-5004Which limits-related option is used to control the maximum file size that a user can create? filesize maxfile fsmax fsizeThe fsize option is used within the limits.conf file to control the maximum size of a file that can be created by a user for whom the limit applies.
870102-5002You are using an SSH server over a poor network connection but would like to maintain the connection in the event of keepalive messages being lost. Which client option can be set to set the number of keepalive messages that can be lost before the client will terminate the connection? ServerTerminateCount ServerAliveCountMax ServerKeepAliveCount ServerClientKeepAliveCountThe ServerAliveCountMax option is used to set the number of keepalive messages that can be sent by the client but not responded to before the client will terminate the connection.
871102-5003If the /etc/nologin file exists and is in use preventing users from logging in, which file can be used to provide a message to those users who are refused a login? /etc/login.mesg /etc/login.disabled /etc/nologin /etc/nologin.messageThe /etc/nologin file prevents login when present and can also contain a message that is displayed to users when attempting to login.
872102-5001Which option to ssh-add specifies the lifetime that a key is held in the agent? -t -a -l -cThe -t option specifies the lifetime for the key and is usually given in seconds but can also be given in minutes, hours, days, and weeks with qualifiers. The other options shown do not fulfill the scenario described.
873102-5001Which option for an SSH connection sets up a remote forwarding scenario? -R -r -e -dThe -R option sets up a remote forward so that remote users can also connect to the tunnel being set up. The other options are not valid for the remote forwarding scenario.
874102-5002Which option to chage sets the number of days that a user will be warned before they need to change their password? -w -W -t -aThe -W option sets the number of days to warn a user before their password expires. The other options do not exist for chage.
875102-5002Another administrator made a change on the system that resulted in the /etc/shadow file becoming corrupted. Which of the following can be used to recover quickly? The /etc/shadow.bak file The /etc/shadow- file The latest backup in /var/backups/ Single-user modeThe /etc/shadow- file contains the state of the shadow file before the last change and would likely be the first place to begin recovery. The next would likely be a backup, though /var/backups/ does not hold backups unless manually created.
876102-5002When examining the documentation for a service, you notice that it can use libwrap. What functionality does libwrap enable? Start/stop from remote TCP wrappers DNS resolution Shadow passwordsIntegration with the libwrap library is an indicator that a given service or daemon will be able to utilize TCP wrappers for access control.
877102-5001Which option within /etc/sudoers enables the use of an alias for a group of users? User_Alias User_Group User_List User_SpecThe User_Alias option enables specification of a group of users for use elsewhere within the sudoers file.
878102-5001You are using nmap to scan a host for open ports. However, the server is blocking ICMP echo requests. Which option to nmap can you set in order to continue the scan? -P0 -no-ping -s0 -ping-0Setting -P0 will allow no ping requests to precede the scan and is useful for the scenario described. There is an -s option, but it is not used for this purpose. The other options are not valid.
879102-5003Which option within a server-wide SSH client configuration specifies the name and location of the known hosts file to use? KnownHosts UserKnownHosts UserKnownHostsFile UserKnownHostsFilePathThe UserKnownHostsFile configuration option enables specification of the location and filename for the known hosts file for users.
880102-5003You need to generate a host key for SSH using ssh-keygen that has been generated with DSA rather than RSA. Which option and argument to that option will create a DSA key? -k dsa -a DSA -t dsa -h dsaThe -t argument sets the type of key to generate, and dsa creates a key with the dsa algorithm. Other types includes rsa and ecdsa. The files are normally placed in /etc/ssh and assigned names such as ssh_host_[algorithm]_key and ssh_host_[algorithm]_key.pub, where [algorithm] is one of rsa, dsa, ecdsa, or ed25519.
881102-5003The total number of users logged in can be found with which argument to the who command? -t -e -q -lThe -q option prints the users who are logged in along with a count of those users. The -l option prints the login processes, the -t option prints the last system time change, and the -e option does not exist.
882102-5002Which option to the passwd command unlocks an account? -t -u -r -lThe -u option unlocks an account while setting the password. The -l option locks the account, and the -t and -r options do not exist for the passwd command.
883102-5003Which option for user limits sets the maximum number of logins that a user can have on the system? maxsyslogins maxuserlogins maxlogins kennylogginsThe maxlogins option is used to control the number of times that a user can log in. The only other limit-related option shown is maxsyslogins, which sets the maximum number of logins for the entire system.
884lpic12Which filesystem is used to store information about current running processes /environment /proc /etc /devThe /proc filesystem stores information about running processes on the system. The /etc filesystem is used for configuration information, and /dev is used for device information. The /environment filesystem does not exist on a default Linux system.
885lpic13What is the default directory for configuration information related to the modprobe command /etc/modprobe.conf /etc/modprobe /etc/modprobe.d /var/modprobeThe /etc/modprobe.d directory contains information related to the modprobe configuration. This can be overridden with the -C option on the command line.
886lpic11Which of the following wall commands send the message "Please Log Off" to users in the operator group wall -g operator "Please Log Off" ;"wall "Please Log Off" ;"wall -operator "Please Log Off" ;"echo "Please Log Off" | group operatorThe -g option to wall sends the input to the specified group. Answer B will send the output to all users, whereas answers C and D will not work.
887lpic12Which option to dmesg displays the time in local time -rel -e -f -tThe -e option to dmesg displays the time in a localtime and the delta in a format that is typically easier to work with. The -rel option does not exist. The -f option specifies the logging facility, and -t does not display time at all.
888lpic12Which process ID is typically associated with the init process 015100The init process is typically associated with the initial process ID of 1 to indicate that it is the process from which others are spawned. Killing PID 1 will typically and immediately halt the system.
889lpic13You have been troubleshooting a system issue that may be related to the driver in use for a PCI device in the system. Which command and option will display the PCI devices and the drivers being used for those devices? lsusb -v ls -pci lspci -k showpciThe lspci command shows the PCI devices in the system, and the -k option shows the kernel driver being used by the given device. The lsusb command will not accomplish the task requested and the ls command with -pci will not display the correct information. There is no showpci command.
890lpic13Which option to the telinit command will cause the operation to not send any notice to logged-on users -q -v --no-wall -lThe --no-wall option will cause telinit to not send a wall command to logged-in users about the state change. The other options listed in this question do not exist.
891lpic11Which file in the sysfs filesystem could you view in order to see the MAC address of eth0 /sys/class/net/eth0/address /sys/devices/eth0 /sysfs/devices/eth0 /sys/net/eth0The class/net hierarchy within /sys contains information on the network configuration for the computer. It is a symlink to the devices hierarchy, where the device will be listed by its address rather than the logical eth0 name.
892lpic12When using systemctl to kill a process, what is the default signal sent to a process SIGKILL SIGTERM SIGINT SIGCALLThe SIGTERM signal is the default signal sent with the systemctl kill command.
893lpic14A newly added Serial ATA (SATA) disk is not showing up during the boot process. Where can you check to begin troubleshooting this issue Using system logging Using debugfs Within the fdisk utility Within the computer BIOSA logical location to begin troubleshooting is within the system BIOS to ensure that the drive is being detected by the computer.
894lpic13Which command can be used to monitor communication taking place with dbus dbus-mon dbus -m dbus-monitor dbus-debugThe dbus-monitor program, which requires an X display, can be used to monitor dbus. The other programs and options listed for this question do not exist.
895lpic11Within a systemd environment, which service manages udev systemd-udevd.service systemd-udev.service udevd-service systemd.udevd-serviceThe udevd service is called systemd-udevd.service within a systemd environment.
896lpic11What is the correct syntax to indicate that the system should shut down at 8 p.m. shutdown 20:00 shutdown 8pm shutdown +20:00 halt 20The system can be scheduled to shut down at a certain time, and that time should be entered in 24-hour format, as shown in the answer.
897lpic13Which option to the systemctl kill command will change the signal sent to the process to be killed -k -f -s -dThe -s option changes the signal to be sent from its default of SIGTERM. The new signal must be one of the main signal types, such as SIGINT or SIGSTOP.
898lpic14Which systemd command and option is equivalent to the chkconfig --list command in a SysVinit environment systemctl list-unit-files systemctl list-service systemctl --list systemctl list-unit-files --type=serviceThe list-unit-files command will show the files available, whereas --type=service will limit those files to the services, in the same way that chkconfig --list returns a list of services.
899lpic11Which option to ldconfig is used to change the location of the cache to be updated -C -c --f -vThe -C option sets the location of the cache to be updated instead of the default /etc/ld.so.cache. The lowercase option, -c, changes the format of the cache, whereas -v sets verbose mode. The --f option does not exist.
900lpic13Which of the following commands will remove all files for a package in Debian, including configuration files apt-get remove apt-cache clean dpkg -P apt-get conf-removeThe -P option to dpkg will purge a package from the system, including the configuration files associated with the package. The apt-cache clean command cleans the package cache but not an individual package, and the apt-get remove command removes a package but not the associated configuration files.
901lpic13What is the prefix used to denote a Debian source repository in /etc/apt/sources.list deb source deb-src debsrcThe deb-src prefix is used to indicate that a given repository contains source packages. The deb prefix in option A would indicate normal packages. The other options are not valid.
902lpic12Which options to rpm will upgrade a package while displaying progress and other additional information about the operation -Iv -Uvh -U -vhThe -U option is used to upgrade a package. Adding -v for verbose and -h for hash marks will print additional information and progress, as requested by the problem.
903lpic11Which option to a yum install command will cause yum to assume yes and therefore not prompt for verification when performing actions deemed critical -y -f -p -mThe -y or --assumeyes option will do what it says: Assume that you will answer “yes” and therefore not prompt. The other options do not exist.
904lpic11When working with a yum-based system, you need to create a configuration to ensure that certain packages are not upgraded or installed. Which option can you set in /etc/yum.conf to facilitate this behavior exclude noupdate assumeupdate clearupdateThe exclude option within /etc/yum.conf is a space-separated list of packages that accepts wildcards and is a list of packages that cannot be installed or upgraded. The other options listed in this question do not exist.
905lpic13You are having difficulty with shared libraries on the system. Which of the following commands will print the current directories and libraries in the cache ldconfig -C ldd -f ldconfig -p ldd -bThe ldconfig command is used to work with the library cache, and the -p option prints the directories and libraries in the cache. The -C option tells ldconfig to use a different cache. The ldd command prints the library dependencies for a given command, but the options given dont exist for ldd.
906lpic14Which option within a .repo file in /etc/yum.repos.d/ is used to set the URL for the repository url repourl httpurl baseurlThe baseurl option is used to set the URL and must be fully qualified, meaning that it must include the protocol, such as http:// or file://.
907lpic12Which command and option is used to display basic information about each available package and its dependencies on a Debian system apt-get list apt-cache dump apt-get list-all apt-cache listThe apt-cache dump command will display a listing of the available packages and their respective dependencies. The other commands and options listed in this question do not exist.
908lpic11When running the lsblk command, there is no separate partition listed for /boot. From which partition is the system likely booted There is a /boot directory under the / partition. The /boot partition is hidden. The system has not yet built the /boot partition. The /boot partition does not show up with lsblk.The /boot directory almost certainly exists but has not been partitioned into its own space. The /boot partition would not be hidden from lsblk if it was indeed a separate partition.
909lpic12Within which hierarchy is cached data stored for both yum- and apt-style systems /etc /var/cache /usr/lib /tmpThe /var/cache hierarchy contains cached data for both package management tools— in the case of yum, in /var/cache/yum, and in the case of a Debian-based system, in /var/cache/apt.
910lpic11On a BIOS-based system, within which region of the disk is the boot loader typically installed MBR /boot Sector 8192 FrontThe master boot record (MBR) is the typical location for the boot loader to be stored on a BIOS-based system.
911lpic14Which of the following best describes the contents of the / filesystem within Linux The / filesystem is the root filesystem and contains temporary files. The / filesystem is roots home directory. The / filesystem is used for storage of device and swap information. The / filesystem is the root filesystem and is the logical root of the hierarchy within Linux.The / filesystem is the root filesystem. If separate partitions have not been created, the / filesystem will be the beginning of the hierarchy and will contain all other directories in the same partition.
912lpic11Which of the following commands will send the output of the grub-mkconfig command to the correct location for booting grub-mkconfig --output=/boot/grub2/grub.cfg grub-mkconfig --file=/boot/grub2.menu grub-mkconfig --file=/boot/grub.lst grub-mkconfig --output=/boot/menu.lstThe --output option configures the location for output of the command instead of STDOUT.
913lpic11Which of the following commands writes an image called from the current directory called raspbian.img to the SD card mounted at /dev/sdc dd if=raspbian.img of=/dev/sdc bs=1M imgwrite raspbian.img > /dev/sdc imgw raspbian.img | cat /dev/sdc dd raspbian.img > /dev/sdcThe dd command is used for this purpose, and for this case it takes an input file with the if option and an output destination with the of option. The bs option signals that the block size for writing should be 1 megabyte.
914lpic14When troubleshooting a problem, you look through .bash_history to determine commands that youve recently executed. However, the file does not contain information from your current session. Which command can you use to view the commands that have been executed during the current session? cmdhist cmds pwd historyThe history command displays history from the current session and can be used for the purpose described. The .bash_history file is written on session close, by default.
915lpic13Which option should be sent to grub-install if you want to install the boot images within a directory other than /boot --boot --image --boot-directory --bThe --boot-directory option will install the boot images into the directory specified. This might be helpful for nonstandard installs or at times when you need to mount the boot partition separately. The other options listed in this question do not exist.
916lpic11Which command should be run in order to make changes take effect for a GRUB2 configuration change update-grub grub-update grub-config grub-insThe update-grub command should be executed in order to make changes take effect in the menu and when changes have been made to the GRUB configuration. The other commands listed in this question do not exist.
917lpic12Which of the following commands will set the environment variable JAVA_PATH equal to /home/user/java2 when using the Bash shell invoke JAVA_PATH=/home/user/java2 export JAVA_PATH=/home/user/java2 envvar JAVA_PATH=/home/user/java2 echo JAVA_PATH=/home/user/java2The export command is used for this purpose and accepts a name=value pair, as shown in the answer. The other commands are not valid with the exception of the echo command, which will simply echo the argument to the console.
918lpic13Which option in the .bashrc sets the number of commands to keep in the .bash_history file HISTLIMIT HISTORYFILE HISTFILESIZE HISTNUMThe HISTFILESIZE option configures the number of commands to keep in the history file. The other variables are not valid within Bash.
919lpic14Which of the following commands will cause nl to number all lines, including blank lines, for a file called code.php nl code.php nl -a code.php nl -n code.php nl -b a code.phpThe -b option configures the body numbering format for nl, which by default will not number blank lines. The a format option will number all lines, including blanks. The -a option is not valid for the nl command, and the -n option configures the numbering format and would require an additional argument in order to be valid.
920lpic14Which command can be used to create an octal representation of a given plaintext file oct cat list odThe od command is used to create octal output. The cat command will show the file as it exists on disk. The other two commands are not valid.
921lpic11Which command and option can be used to format text with pagination in a double-space format, including page numbers pr -d pag -db cat -pd print -dThe pr command formats text for printing, including the date and page numbers at the top of each page. Adding the -d option causes the output to be double-spaced. The cat command will display output but not paginated in such a way. The other two commands are not valid.
922lpic11Of the following options for the tail command, which option outputs the last lines beginning at the 30th line from the start of the file rather than the end of the file -n +30 -n 30 -3030The -n option is used to change the number of lines. Adding the +N after the -n option begins the tail process at the Nth line within the file.
923lpic13Which option to the uniq command causes the matching to be done in a case-insensitive manner -c -f -i -nThe -i option causes the unique test to be done while ignoring the case of the element to be matched.
924lpic13Which of the following commands prints the username and real name of all users in /etc/passwd in a tab-separated format cut -d: -f 1,6 /etc/passwd sed 's/://' /etc/passwd awk -F: '{print $1,$5}' OFS="\t" /etc/passwd cat -o "\t" /etc/passwdThe awk command shown can be used for this purpose. The -F option sets the field separator, and the OFS option sets the output field separator.
925lpic13Which option to cp will preserve symlinks in a recursive copy -f -d -a -bThe -a option is equivalent to the -d and -R options, which preserve links and copy recursively, respectively. The -b option creates a backup, and -f forces the copy.
926lpic11Which of the following key combinations is a technique for moving to the 23rd line of a file in Vi 23G /23 i23 ZZWhen in command mode, typing a number followed by an uppercase G will immediately move the cursor to that line number. The /23 option will search for the number 23 in the file. The i23 option will insert the number 23, and finally ZZ will exit Vi.
927lpic11Which option to the top command changes the update interval -d -t -n -fThe -d option changes the update interval and can be helpful on a busy system where top may be affecting performance. The -n option sets the number of iterations to run. There is no -t or -f option for top.
928lpic12Which of the following commands will display the process ID, the real user ID, the filesystem access user ID, and command for processes on the system listproc -uf ps -eo pid,euser,fuser,comm ps -e pid,user,comm ps -faThe ps -e command is used to display all processes, and the -o option configures the columns to display.
929lpic11Which command can be used to search the contents of all files below your current location for files that contain the characters DB grep -r "DB" * grep -ri "DB" * cat * | less cat *.txt | grep DBThe grep command will be used for this purpose. Note the difference between grep -r and grep -ri. The question did not ask for case insensitivity, and therefore the use of -i in option B makes it incorrect.
930lpic12Which of the following commands will locate all files that begin with the name DB, starting from the current directory locate "DB*"find ./ -name "DB*"whereis "DB*"find "DB*"The find command will be used for this purpose. Setting the directory from which to begin the find is required, along with the expression, which in this case, are files beginning with DB.
931lpic12Which of the following files is the location used to gather information about load average for use in the uptime command /proc/uptime /proc/loadavg /proc/load /proc/utimeLoad average information is gathered from /proc/loadavg, whereas uptime information is stored on /proc/uptime.
932lpic14When running fsck on an EXT3 filesystem, which option to fsck causes the operation to prompt when attempting a repair action -y -f -a No option requiredInteractive repair is the default, so no option is required. The -f option forces the operation, and -y and -a are both variations of noninteractive repair.
933lpic14Which of the following files is updated dynamically with information about currently mounted filesystems /etc/fstab /etc/files /boot/fstab /etc/mtabThe /etc/mtab file is updated dynamically as filesystems are mounted and unmounted. The /etc/fstab file is not dynamically updated.
934lpic12When running the df command, you need to change the scale so that the report shows terabytes instead of bytes. Which option will accomplish this task -ST -BT -j -TThe -B option changes the format, and T sets the scale to terabytes. The -T option alone prints the filesystem type. The other options do not exist.
935lpic11What command can be used to create an image of important metadata for an ext3 filesystem e2image e3image dumpe2fs dumpe3fsThe e2image program can be used to create an image of metadata that can help with drive recovery. The resulting image file can be used with programs like dumpe2fs and debugfs.
936lpic13Which option to mke2fs is used to check for bad blocks during filesystem creation -a -b -c -dThe -c option checks for bad blocks. The -b option sets the block size. There is no -a or -d option.
937lpic12Which of the following commands changes the ownership of the file called Class.java to the user steve and the group developers chgrp steve:developers Class.java chown steve.developers Class.java chown developers.steve Class.java chown Class.java steve.developersThe chown command is used for this purpose and can be used to set both the user and group for ownership.
938lpic11When bootstrapping a virtual machine, which command can be used to add the fingerprint of a server to the known_hosts file ssh-keyscan ssh-keyadd ssh-keylist ssh-getkeyThe ssh-keyscan command can be used for the purpose described and can help with virtual machine deployment by obtaining the SSH host key and adding it to the known_hosts file.
939lpic13Which configuration option can be set within /etc/default/grub to affect the behavior of the system after a failed boot GRUB_RECOVER GRUB_NOFAIL GRUB_RECORDFAIL_TIMEOUT GRUB_RECOVER_TIMEOUTThe GRUB_RECORDFAIL_TIMEOUT option is used to configure the behavior of the system in the event of a failed boot. Setting the value to -1 will display the GRUB menu and not continue booting. Setting the value to 0 will cause the menu to not display. Setting to a value greater than or equal to 1 will cause the menu to display for that many seconds.
940lpic11Which options to du will print a summary of information in a human-readable format -sh -h -s -suThe -s option displays a summary, and -h displays it in a human-readable format.
941lpic14Which option to the find command causes it to follow symbolic links -S -H -P -LThe -L option tells find to follow symlinks. The -H and -P options are both variations to tell find not to follow symlinks, and the -S option does not exist.
942lpic11Which option to the tee command enables appending to the destination files rather than overwriting -a -m -g -dThe -a option appends to the file rather than overwriting when using tee. The other options do not fulfill the needs of the problem statement.
943lpic13When creating a backup for a system, which directory should be included so that most configuration files will be backed up /var /opt /etc /binThe /etc directory and its subdirectories typically contain configuration files that would be necessary in order to re-create the system in a restoration scenario. The /var directory usually contains variable information, whereas /opt may be used for several other purposes. The /bin directory contains binaries that can usually be reinstalled.
944lpic11To which file should you add an entry in order for a host to be blocked using TCP wrappers /etc/hosts.deny /etc/tcp.wrappers /etc/wrap.config /etc/tcpwrap.confThe /etc/hosts.deny file is part of TCP wrappers along with /etc/hosts.allow. Both provide a basic mechanism for configuration of access from remote hosts to network services.
945lpic13Which of the following commands creates an alias for the ps command such that the options auwx are included when the user types psa alias "ps auwx" = "psa"alias psa=ps uawx alias psa="ps auwx”psa="ps auwx"The alias command uses the alias name followed by an equal sign followed by the command to be aliased. In this case, because the command to be aliased contains spaces, it needs to be contained in quotation marks.
946lpic13Which of the following conditionals in a Bash script will test if the variable DAY is equal to SUNDAY if ($DAY == "SUNDAY") if ($DAY -eq "SUNDAY") if [[ $DAY == "SUNDAY" ]] If [ $DAY == "SUNDAY" ]Shell scripting syntax uses the format shown, with square brackets around the condition to the tested and double-equal signs for a string test. Variables are preceded by a dollar sign as shown.
947lpic11Which of the following commands is necessary for making a variable defined in your current shell available to child processes export source let defThe export command is necessary so that any variables that are manually defined in your current session become available to child processes. The source command executes the file and can be used for the purpose described but requires an additional argument. The let and def commands are not valid.
948lpic13You are watching another administrator perform some work on a server. As part of that work, the admin uses the following command: . variables.sh Which of the following is the equivalent of . variables.sh? let variables.sh set variables.sh source variables.sh var variables.shThe source command is the functional equivalent of a single dot (.). The set command exists but is not used for this purpose. The other commands are not valid.
949lpic11Which of the following commands adds ~/code/bin to the path PATH=~/code/bin:$PATH PATH=/code/bin:$PATH PATH=/home/code/bin:$PATH PATH=PATH:~/code/binThe syntax for setting the PATH separates the new path with a colon, as shown in the correct option. A primary difference between the correct and incorrect options for this question was in how the actual specified path was shown.
950lpic11Which of the following shows a valid Bash function called sayHello function sayHello () { echo "hello }" function sayHello{} function sayHello() { echo Hello } function sayHello() { echo Hello } ;The correct syntax is as shown. Note that a semicolon is required when the commands are included on one line, as displayed in the answer.
951lpic13Which of the following commands sends an email to root with the subject of Update and the content of the /etc/hostname file mail root > /etc/hostname mail -s Update root > /etc/hostname mail -s Update root < /etc/hostname mail root -s Update /etc/hostnameThe mail command with -s for the subject is necessary, followed by the email address for the mail. Then, input is redirected to the mail command using /etc/hostname.
952lpic13Files that should be copied to a users home directory when their account is created should be placed in which of the following directories /etc/usertemplate /etc/template /etc/skel /etc/userskelThe /etc/skel directory contains files that are a skeleton of a users home directory when their account is created. The other directories listed do not exist by default.
953lpic14Which of the following areas within an Ubuntu system contains information and settings for accessibility Accessibility Access and Help Universal Use Universal AccessThe Universal Access section, which can be found by typing Universal Access from within an Ubuntu GUI interface, enables configuration of accessibility options.
954lpic12Which command can be used to set the delay and repeat rate for a keyboard keyboard kbdrate kbd keyrateThe kbdrate command is used for the purpose described and can help with accessibility. The other commands shown are not valid.
955lpic11Which variable is used to indicate the screen on which GUI applications will be shown DISPLAY SCREEN LIST XWINThe DISPLAY variable controls the destination and screen for displaying GUI applications. Setting this variable facilitates forwarding of X applications over ssh.
956lpic12Users can be added or removed for access to the X server. Which command facilitates this xauthorization xhost xwin xconnectThe xhost command is used to control who can make connections for both users and hosts to a given X server. The other commands are not valid.
957lpic12Which option to useradd sets the number of days between password expiration and when the account is disabled -n -f -e -gThe -f option sets the days between expiration and disabled for an account. The -g option is used to set the group ID, whereas -e is used to set the overall expiration date.
958lpic11Which of the following commands displays the current mail aliases known on the server getent aliases getalias listalias mail aliasesThe getent command can be used for the purpose described and will display the aliases on the server by examining the aliases database. The other commands are not valid and, in the case of the mail command shown, will simply attempt to send mail to an address known as aliases.
959lpic13Which of the following configuration lines in /etc/hosts.deny creates a deny-by-default policy where clients will need to be specifically allowed in /etc/hosts.allow *.* All: * ALL: ALL LOC: ALLThe ALL: ALL syntax will cause all hosts to be denied. This means that you must explicitly authorize hosts and networks using /etc/hosts.allow.
960lpic12Which of the following describes the result of running the atq command as root The current cron and at jobs for root will be listed. The current at jobs for all users will be listed. The current cron and at jobs for all users will be listed. The last 10 entries in the at log will be shown.The current at jobs for all users are shown when atq is executed as superuser.
961lpic13Which command option can be used to remove all cron jobs for a given user using the crontab command -d -e -r -lThe -r option to the crontab command removes all cron entries for a given user. The -l option lists cron jobs, whereas the -e option edits the crontab. There is no -d option.
962lpic11Which option to the crontab command enables you to work with a different users cron jobs -u -m -d -eThe -u option specifies the user. The -l option lists the cron jobs and -e edits them. There is no -d or -m option.
963lpic11When deleting a user from the server, you need to maintain their home directory rather than deleting it. Which option of the following commands deletes the user <username> but preserves their home directory userdel <username> userdel -r <username> userdel -h <username> userdel -p <username>The userdel command, given no other options, does not delete the home directory. When given the -r option, the command will delete the home directory and mail spool file. There is no -h or -p option for the userdel command.
964lpic14After deleting a group, you need to search the filesystem for files owned by the group using its group ID. Which option to the find command will search using the group ID -name -group -groupid -gidThe -gid option is used to specify group ownership for the find command. The -group option does exist, but since the question specified that the group had already been deleted, the gid must be used instead. There is a -name option, but it searches by name and not group ID.
965lpic12Which of the following commands changes the group name from admins to serveradmins groupmod -g admins serveradmins groupmod -n serveradmins admins groupchg -n serveradmins admins groupchg admins -n serveradminsThe groupmod command will be used for this purpose, and the -n option followed by the new group name is used to change the name. There is no groupchg command.
966lpic14Which command is used to parse log file entries on a systemd-based system logger journalentry jrnctl journalctlThe journalctl command is used to view and parse log file entries on systemd-based systems that maintain logs in a special format. The logger command can be used to create log entries, and the other commands shown do not exist.
967lpic11Which option to the ntpdate command configures the version to use such that an older Network Time Protocol (NTP) server could be queried -o -v -e -rThe -o option followed by either 1 or 2 enables ntpdate compatibility with older NTP servers. The default, when no -o option is specified, is version 3. The -v option tells ntpdate to be verbose, whereas the -e option sets the authentication timeout.
968lpic14Within which directory are systemd journals stored by default /var/log/systemd /var/systemd/journal /var/log/journald /var/log/journalThe /var/log/journal directory is used to store journal log files for systemd-based systems. The other directories do not exist by default.
969lpic13Which option to the logrotate command specifies the mailer to use -o -s -m -vThe -m option sets the mail program to use when mailing logs. It is set to /usr/bin/mail -s by default. There is no -o option, and -v is verbose. The -s option to the logrotate command sets the state file to use.
970lpic11Which option to date changes the output to Coordinated Universal Time (UTC) regardless of the current time zone -u -t -s -vThe -u option configures the output to UTC regardless of the time zone. The -s option sets the time, and there is no -v or -t option.
971lpic14Which of the following commands can be used to delete a print job on a system that uses the lp print system lpdel rmprint rm -print lprmThe lprm command is used to remove print jobs on a system that uses the lp system for printing. There is no lpdel or rmprint command. There is an rm command, but its not used for working with print queues.
972lpic14Which of the following subnet masks represents a /23 255.255.255.0 255.255.0.0 255.255.255.255 255.255.254.0The 255.255.254.0 subnet mask is equivalent to /23. The 255.255.255.0 subnet mask is /24. The subnet mask 255.255.255.255 is /32, and 255.255.0.0 is /16.
973lpic11An entry in /etc/nsswitch.conf indicates hosts: files dns. In which order will /etc/hosts be queried for a hostname lookup The /etc/hosts file will be examined first. The /etc/hosts file is not related to hostname lookup. The /etc/hosts file will be queried second. The /etc/hosts file will be queried last.The /etc/hosts file will be examined first, and then a Domain Name System (DNS) query will be sent based on the configuration shown.
974lpic14Which port needs to be allowed through the firewall for standard Lightweight Directory Access Protocol (LDAP) traffic to be received by the server TCP port 25 TCP port 443 TCP port 143 TCP port 389Standard LDAP traffic is TCP port 389 on the server. TCP port 25 is SMTP, 443 is HTTPS, and 143 is IMAP.
975lpic13Which option to ssh changes the username to use for logging in to the server -v -i -l -uThe -l option to ssh changes the username sent for authentication. This can be useful for scripting scenarios where the @ notation cannot be used. The -v option is verbose mode, and -i is the identity file to use. There is no -u option.
976lpic14Which option to ping disables name resolution -d -D -f -nThe -n option disables name resolution for addresses involved in the ping request/reply. The -D option returns a time stamp, whereas -d sets the SO_DEBUG option. Finally, -f is a flood ping.
977lpic11Which of the following commands shows various statistics for a network interface such as packets and bytes received and transmitted along with errors and other such conditions ifconfig ifstat if -s ifcondThe ifconfig command shows various statistics about the interfaces on a Linux system, including whether the interface is up or down, its packets and bytes, queue length, and other information. The other commands listed do not exist.
978lpic13When using the host command, which option displays the Start of Authority (SOA) record from each of the authoritative DNS name servers for the given domain -N -n -C -aThe -C option shows the SOA for each of the DNS name servers listed as authoritative for the domain. The -a option sends an ANY query, whereas -N sets the number of dots for the domain to be considered absolute. There is no -n option.
979lpic11You need to specify an additional localhost address and hostname for a server in order to support a specialized network configuration. Which line in /etc/hosts sets the hostname with a unique IP address in the correct range for localhost 127.0.1.1 host.example.com host 192.168.0.1 host.example.com host host.example.com 127.0.0.1 host.example.com 172.16.31.32The entire 127.0.0.0/8 range is available for local host addresses. Therefore, an answer would need to be in this range. The proper format for /etc/hosts is IP address followed by name, followed by optional aliases, which makes option A correct.
980lpic13Which of the following options to ifup tells the command to ignore errors and continue --continue --C --ignore-errors -hThe --ignore-errors option tells ifup to continue even if there are otherwise fatal errors. The -h option outputs help. There is no -C or --continue option.
981lpic13Which option to passwd can be used to unlock an account that was locked with the passwd command -S -l -u -wThe -u option unlocks an account that was locked using the -l option. The -w option sets the warn days, and -S prints the status.
982lpic13Which of the following is the correct syntax to connect using ssh to host.example.com on port 2200 ssh -l 2200 host.example.com ssh host;example.com ssh host.example.com:2200 ssh host:2200 -d example.comWhen connecting to an alternate port, you can use the -p option to set the port or use a colon to separate the host from the port.
983lpic12Which option in /etc/sudoers sets the destination address for administrative and security emails related to sudo mail mailto secmail adminmailThe mailto configuration option sets the destination for emails related to sudo. The other options listed are not valid for sudo.
984lpic12Which of the following commands displays a listing of who is logged in to the server along with the date and time that they logged in whois who loggedin curusersThe who command displays who is currently logged in and the date and time they logged in. The whois command displays information about domains. The other commands are not valid.
985lpic13Which port should be allowed through a firewall for NTP communication Port 139 Port 161 Port 123 Port 194Port 123 is used for NTP communication by default. Port 161 is SNMP, 139 is NetBIOS, and 194 is IRC.
986lpic14Which option to nmap causes it to scan using UDP -sT -sS -sP -sUA UDP scan can be initiated with -sU. A scan of -sT is a normal TCP scan, and -sS is a SYN scan. There is no -sP option.
987lpic12Which of the following options to lsof searches an entire directory tree for open instances of files or directories -d +D -f -iThe +D option is used to search an entire directory tree for files that are open by processes. The -d option does essentially the same thing but does not go into subdirectories. The -f option is typically used in combination with other options to control path name interpretation. The -i option lists files or processes with open ports.
988lpic13Which option to the ip command displays DNS names rather than merely IP addresses -n -f -r -aThe -r option causes the ip command to attempt to resolve IP addresses. The -f option specifies the protocol family. There is no -n or -a option to the ip command.
989lpic11Which of the following commands and options enables you to examine timing related to listening sockets ss -o netstat -rn ping -f ls -lThe ss command will be used, and when given the -o option, timer information is displayed. The netstat -rn command shows route information but not sockets or timing, and ping -f is a flood ping and not related. The ls -l command displays files in a long listing format.
990lpic13Which of the following IP address and subnet mask pairs represents a private network in a /24 size 192.168.3.0/255.255.255.128 172.16.19.128/255.255.0.0 192.168.2.0/255.255.255.0 10.168.1.0/0.0.0.255All of the addresses shown are in private ranges. The only one with the correct netmask is 255.255.255.0, which is equivalent to 24 masked bits.
991lpic13When viewing the results of a traceroute, you see !H. To what does !H refer Network unreachable Host available Host unreachable High lengthThe !H sequence indicates host unreachable. Network unreachable is !N.
992lpic14On which port does the ping command operate for Internet Control Message Protocol (ICMP) echo requests 53133733433No port is used for ICMP.There is no port for ICMP. The protocol itself does not use ports.
993lpic12When using netstat -a, which file is consulted for the port number to name translation /etc/portnum /etc/services /etc/portnames /proc/sys/net/ipv4/portsThe /etc/services file contains the port number to name translation for a given server. The file contains well-known ports and can be customized on a per-server basis.
994lpic11Which of the following commands launches Orca with speech capabilities orca --no-setup --disable main-window orca --screen orca --screen-reader orca --no-setup -sThe command shown launches speech output for Orca. The other commands contain options that are invalid and thus will not work.
995lpic11Which of the following locations stores the configuration for LightDM /etc/lightdm/ /etc/lightdm.conf /etc/lightdm-conf /etc/lightdm.dThe configuration files can be found in the /etc/lightdm hierarchy or in /usr/share/ lightdm. The other directory locations do not exist by default.
996lpic14Which of the following commands displays statistics and information about windows in X windows xinfo xstats xwin xwininfoThe xwininfo command is used to gather information about windows. The other commands shown are not valid.
997lpic11Which of the following commands can be used to set the time zone on a Debian system tzconfig /etc/timeconfig timeconfig timecfgThe tzconfig command can be used on a Debian system to set the time zone. The other commands listed do not exist.
998lpic13Which of the following commands displays the available character maps charmap charmap -l locale -m mapinfoThe locale command will be used for this purpose, and the -m option displays the available character maps. There is no charmap or mapinfo command.
999lpic12Within which directory hierarchy will you find information regarding the available time zones on the server /usr/zoneinfo /usr/share/zoneinfo /etc/zoneinfo /etc/tz.conf.dTime zone information is found within the /usr/share/zoneinfo hierarchy. The other directories listed do not typically exist by default.
1000lpic11The driftfile, as specified in /etc/ntp.conf on a Red Hat system, is stored in which location by default /var/lib/ntp/drift /var/ntp/drift /usr/share/ntpdrift /usr/share/lib/ntpdriftThe default location on a Red Hat system is /var/lib/ntp/drift. The other locations shown do not exist by default. Within /etc/ntpd.conf, the location of the drift file can be changed with the driftfile option.
1001lpic13Which character combination sets the body of the message to STDIN when using the mail command < > <<< |The <<< character combination reads input from STDIN or standard input and uses it as the body of the message for the mail command.
1002lpic13Which of the following commands deletes a group from a CentOS Linux system groupdm grouprm groupdel delgroupThe groupdel command is used to remove a group from a system. No members of the group can remain or the command will fail.
1003lpic13Which of the following syslog facilities captures messages from the lp printing facility auth messages lpr rootThe lpr syslog facility sends messages from the lp subsystem to syslog. The auth facility is used for security-related messages. The other listed options are not syslog facilities.